Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-1355 (GCVE-0-2022-1355)
Vulnerability from cvelistv5
Published
2022-08-31 00:00
      Modified
2024-08-03 00:03
      
          Severity ?
        
        
          VLAI Severity ?
        
        
          EPSS score ?
        
        CWE
          - CWE-121 - - Stack-based Buffer Overflow.
Summary
A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.
            
          
        References
          {
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T00:03:05.863Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.com/libtiff/libtiff/-/issues/400"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/323"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2022-1355"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20221014-0007/"
          },
          {
            "name": "GLSA-202210-10",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202210-10"
          },
          {
            "name": "[debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
          },
          {
            "name": "DSA-5333",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5333"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "libtiff",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Not-Known"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "CWE-121 - Stack-based Buffer Overflow.",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-30T00:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
        },
        {
          "url": "https://gitlab.com/libtiff/libtiff/-/issues/400"
        },
        {
          "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/323"
        },
        {
          "url": "https://access.redhat.com/security/cve/CVE-2022-1355"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20221014-0007/"
        },
        {
          "name": "GLSA-202210-10",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/202210-10"
        },
        {
          "name": "[debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
        },
        {
          "name": "DSA-5333",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.debian.org/security/2023/dsa-5333"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2022-1355",
    "datePublished": "2022-08-31T00:00:00",
    "dateReserved": "2022-04-14T00:00:00",
    "dateUpdated": "2024-08-03T00:03:05.863Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-1355\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2022-08-31T16:15:09.577\",\"lastModified\":\"2024-11-21T06:40:33.603\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado un fallo de desbordamiento del b\u00fafer de la pila en la funci\u00f3n main() del archivo tiffcp.c de Libtiffs. Este defecto permite a un atacante pasar un archivo TIFF dise\u00f1ado a la herramienta tiffcp, desencadenando un problema de desbordamiento del b\u00fafer de la pila, posiblemente corrompiendo la memoria, y causando un fallo que conlleva a una denegaci\u00f3n de servicio\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":4.2}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.0\",\"matchCriteriaId\":\"089A82D2-D7BA-42E9-961F-A61E72537850\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6FB57C-2BC7-487C-96DD-132683AEB35D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7CF3019-975D-40BB-A8A4-894E62BD3797\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/security/cve/CVE-2022-1355\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2074415\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/issues/400\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/merge_requests/323\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202210-10\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221014-0007/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5333\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2022-1355\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2074415\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/issues/400\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/merge_requests/323\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202210-10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221014-0007/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5333\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}
  rhsa-2022:8194
Vulnerability from csaf_redhat
Published
2022-11-15 15:17
    Modified
2025-10-09 21:53
    Summary
Red Hat Security Advisory: libtiff security update
    Notes
Topic
An update for libtiff is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
* libtiff: reachable assertion (CVE-2022-0865)
* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)
* libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c (CVE-2022-1354)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for libtiff is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)\n\n* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)\n\n* libtiff: reachable assertion (CVE-2022-0865)\n\n* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)\n\n* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)\n\n* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)\n\n* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)\n\n* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)\n\n* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)\n\n* libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c (CVE-2022-1354)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:8194",
        "url": "https://access.redhat.com/errata/RHSA-2022:8194"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2042603",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
      },
      {
        "category": "external",
        "summary": "2054494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
      },
      {
        "category": "external",
        "summary": "2054495",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
      },
      {
        "category": "external",
        "summary": "2064145",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
      },
      {
        "category": "external",
        "summary": "2064146",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
      },
      {
        "category": "external",
        "summary": "2064148",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
      },
      {
        "category": "external",
        "summary": "2064406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
      },
      {
        "category": "external",
        "summary": "2064411",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
      },
      {
        "category": "external",
        "summary": "2074404",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
      },
      {
        "category": "external",
        "summary": "2074415",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8194.json"
      }
    ],
    "title": "Red Hat Security Advisory: libtiff security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:53:45+00:00",
      "generator": {
        "date": "2025-10-09T21:53:45+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:8194",
      "initial_release_date": "2022-11-15T15:17:35+00:00",
      "revision_history": [
        {
          "date": "2022-11-15T15:17:35+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-11-15T15:17:35+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:53:45+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.1.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 9)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 9)",
                  "product_id": "CRB-9.1.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.src",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.src",
                  "product_id": "libtiff-0:4.4.0-2.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.src",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.src",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-0561",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054494"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchStripThing() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to exploit this flaw, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054494",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0561",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0562",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054495"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFReadDirectory() in tif_dirread.c. This flaw allows an attacker to exploit this vulnerability via a crafted TIFF file, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054495",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0562",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0865",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064406"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A reachable assertion failure was found in libtiff\u0027s JBIG functionality. This flaw allows an attacker who can submit a crafted file to an application linked with libtiff and using the JBIG functionality, causes a crash via an assertion failure, leading to a denial of service. The exact mechanism and conditions around this issue are dependent on how the application uses libtiff.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: reachable assertion",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064406",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0865",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865"
        }
      ],
      "release_date": "2022-03-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        },
        {
          "category": "workaround",
          "details": "Applications that do not parse files from untrusted/malicious sources will not be affected by this vulnerability.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: reachable assertion"
    },
    {
      "cve": "CVE-2022-0891",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064411"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap buffer overflow in extractImageSection",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The severity of this flaw was changed to Low because it is an out-of-bounds read of 1 byte and in the tiffcrop tool rather than in the library.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064411",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0891",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891"
        }
      ],
      "release_date": "2022-02-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "libtiff: heap buffer overflow in extractImageSection"
    },
    {
      "cve": "CVE-2022-0908",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064145"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in LibTIFF where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchNormalTag() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to cause a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064145",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0908",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c"
    },
    {
      "cve": "CVE-2022-0909",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064146"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A floating-point exception (FPE) flaw was found in LibTIFF\u2019s computeOutputPixelOffsets() function in tiffcrop.c file. This flaw allows an attacker with a crafted TIFF file to trigger a divide-by-zero error, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Divide By Zero error in tiffcrop",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064146",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0909",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Divide By Zero error in tiffcrop"
    },
    {
      "cve": "CVE-2022-0924",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064148"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow flaw was found in Libtiffs\u0027 cpContigBufToSeparateBuf() function of the tiffcp.c file. This flaw allows an attacker with a crafted TIFF file to trigger a heap out-of-bounds read access issue, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Out-of-bounds Read error in tiffcp",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "All versions of Libtiff shipped in Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and since Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope, the issue is not currently planned to be addressed in future updates. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064148",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0924",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Out-of-bounds Read error in tiffcp"
    },
    {
      "cve": "CVE-2022-1354",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074404"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow flaw was found in Libtiffs\u0027 tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In order to successfully exploit this vulberability, the attacker needs to create a specially crafted TIFF file designed to exploit the buffer overflow in the TIFFReadRawDataStriped() function. The attacker must then convince or trick a user into processing the malicious TIFF file using the tiffinfo tool.\n\nConsidering the high bar of prerequisites for successful exploitation, RH ProdSec has set the Impact of this vulnerability to \"Low\"",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1354"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074404",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1354",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354"
        }
      ],
      "release_date": "2022-04-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c"
    },
    {
      "cve": "CVE-2022-1355",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "discovery_date": "2022-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074415"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: stack-buffer-overflow in tiffcp.c in main()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074415",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1355",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355"
        }
      ],
      "release_date": "2022-04-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: stack-buffer-overflow in tiffcp.c in main()"
    },
    {
      "cve": "CVE-2022-22844",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-01-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2042603"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow vulnerability was found in libtiff. This flaw allows an attacker with network access to pass specially crafted files, causing an application to halt or crash. The root cause of this issue was from the memcpy function in tif_unix.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "RHBZ#2042603",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22844",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844"
        }
      ],
      "release_date": "2022-01-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c"
    }
  ]
}
  rhsa-2022_7585
Vulnerability from csaf_redhat
Published
2022-11-08 09:33
    Modified
2024-11-22 19:38
    Summary
Red Hat Security Advisory: libtiff security update
    Notes
Topic
An update for libtiff is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
* libtiff: reachable assertion (CVE-2022-0865)
* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for libtiff is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)\n\n* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)\n\n* libtiff: reachable assertion (CVE-2022-0865)\n\n* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)\n\n* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)\n\n* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)\n\n* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)\n\n* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)\n\n* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:7585",
        "url": "https://access.redhat.com/errata/RHSA-2022:7585"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2042603",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
      },
      {
        "category": "external",
        "summary": "2054494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
      },
      {
        "category": "external",
        "summary": "2054495",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
      },
      {
        "category": "external",
        "summary": "2064145",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
      },
      {
        "category": "external",
        "summary": "2064146",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
      },
      {
        "category": "external",
        "summary": "2064148",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
      },
      {
        "category": "external",
        "summary": "2064406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
      },
      {
        "category": "external",
        "summary": "2064411",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
      },
      {
        "category": "external",
        "summary": "2074415",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7585.json"
      }
    ],
    "title": "Red Hat Security Advisory: libtiff security update",
    "tracking": {
      "current_release_date": "2024-11-22T19:38:51+00:00",
      "generator": {
        "date": "2024-11-22T19:38:51+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2022:7585",
      "initial_release_date": "2022-11-08T09:33:41+00:00",
      "revision_history": [
        {
          "date": "2022-11-08T09:33:41+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-11-08T09:33:41+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T19:38:51+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.7.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 8)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 8)",
                  "product_id": "CRB-8.7.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-tools-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-23.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-debugsource-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-23.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-23.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-23.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-devel-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-23.el8?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-tools-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-devel-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-tools-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-23.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-debugsource-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-23.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-23.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-23.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-devel-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-23.el8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-tools-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-23.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-debugsource-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-23.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-debuginfo-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-23.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-23.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-devel-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-23.el8?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.src",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.src",
                  "product_id": "libtiff-0:4.0.9-23.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.i686",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.i686",
                  "product_id": "libtiff-0:4.0.9-23.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-23.el8.i686",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-23.el8.i686",
                  "product_id": "libtiff-devel-0:4.0.9-23.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-23.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-23.el8.i686",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-23.el8.i686",
                  "product_id": "libtiff-debugsource-0:4.0.9-23.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-23.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-23.el8.i686",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-23.el8.i686",
                  "product_id": "libtiff-debuginfo-0:4.0.9-23.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-23.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-23.el8?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.src",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.src",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-0561",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054494"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchStripThing() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to exploit this flaw, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054494",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0561",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0562",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054495"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFReadDirectory() in tif_dirread.c. This flaw allows an attacker to exploit this vulnerability via a crafted TIFF file, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054495",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0562",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0865",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064406"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A reachable assertion failure was found in libtiff\u0027s JBIG functionality. This flaw allows an attacker who can submit a crafted file to an application linked with libtiff and using the JBIG functionality, causes a crash via an assertion failure, leading to a denial of service. The exact mechanism and conditions around this issue are dependent on how the application uses libtiff.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: reachable assertion",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064406",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0865",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865"
        }
      ],
      "release_date": "2022-03-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        },
        {
          "category": "workaround",
          "details": "Applications that do not parse files from untrusted/malicious sources will not be affected by this vulnerability.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: reachable assertion"
    },
    {
      "cve": "CVE-2022-0891",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064411"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap buffer overflow in extractImageSection",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The severity of this flaw was changed to Low because it is an out-of-bounds read of 1 byte and in the tiffcrop tool rather than in the library.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064411",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0891",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891"
        }
      ],
      "release_date": "2022-02-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "libtiff: heap buffer overflow in extractImageSection"
    },
    {
      "cve": "CVE-2022-0908",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064145"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in LibTIFF where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchNormalTag() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to cause a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064145",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0908",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c"
    },
    {
      "cve": "CVE-2022-0909",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064146"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A floating-point exception (FPE) flaw was found in LibTIFF\u2019s computeOutputPixelOffsets() function in tiffcrop.c file. This flaw allows an attacker with a crafted TIFF file to trigger a divide-by-zero error, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Divide By Zero error in tiffcrop",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064146",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0909",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Divide By Zero error in tiffcrop"
    },
    {
      "cve": "CVE-2022-0924",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064148"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow flaw was found in Libtiffs\u0027 cpContigBufToSeparateBuf() function of the tiffcp.c file. This flaw allows an attacker with a crafted TIFF file to trigger a heap out-of-bounds read access issue, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Out-of-bounds Read error in tiffcp",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "All versions of Libtiff shipped in Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and since Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope, the issue is not currently planned to be addressed in future updates. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064148",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0924",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Out-of-bounds Read error in tiffcp"
    },
    {
      "cve": "CVE-2022-1355",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "discovery_date": "2022-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074415"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: stack-buffer-overflow in tiffcp.c in main()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074415",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1355",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355"
        }
      ],
      "release_date": "2022-04-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: stack-buffer-overflow in tiffcp.c in main()"
    },
    {
      "cve": "CVE-2022-22844",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-01-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2042603"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow vulnerability was found in libtiff. This flaw allows an attacker with network access to pass specially crafted files, causing an application to halt or crash. The root cause of this issue was from the memcpy function in tif_unix.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "RHBZ#2042603",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22844",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844"
        }
      ],
      "release_date": "2022-01-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c"
    }
  ]
}
  RHSA-2022:8194
Vulnerability from csaf_redhat
Published
2022-11-15 15:17
    Modified
2025-10-09 21:53
    Summary
Red Hat Security Advisory: libtiff security update
    Notes
Topic
An update for libtiff is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
* libtiff: reachable assertion (CVE-2022-0865)
* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)
* libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c (CVE-2022-1354)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for libtiff is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)\n\n* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)\n\n* libtiff: reachable assertion (CVE-2022-0865)\n\n* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)\n\n* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)\n\n* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)\n\n* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)\n\n* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)\n\n* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)\n\n* libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c (CVE-2022-1354)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:8194",
        "url": "https://access.redhat.com/errata/RHSA-2022:8194"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2042603",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
      },
      {
        "category": "external",
        "summary": "2054494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
      },
      {
        "category": "external",
        "summary": "2054495",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
      },
      {
        "category": "external",
        "summary": "2064145",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
      },
      {
        "category": "external",
        "summary": "2064146",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
      },
      {
        "category": "external",
        "summary": "2064148",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
      },
      {
        "category": "external",
        "summary": "2064406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
      },
      {
        "category": "external",
        "summary": "2064411",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
      },
      {
        "category": "external",
        "summary": "2074404",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
      },
      {
        "category": "external",
        "summary": "2074415",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8194.json"
      }
    ],
    "title": "Red Hat Security Advisory: libtiff security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:53:45+00:00",
      "generator": {
        "date": "2025-10-09T21:53:45+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:8194",
      "initial_release_date": "2022-11-15T15:17:35+00:00",
      "revision_history": [
        {
          "date": "2022-11-15T15:17:35+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-11-15T15:17:35+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:53:45+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.1.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 9)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 9)",
                  "product_id": "CRB-9.1.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.src",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.src",
                  "product_id": "libtiff-0:4.4.0-2.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.src",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.src",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-0561",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054494"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchStripThing() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to exploit this flaw, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054494",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0561",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0562",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054495"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFReadDirectory() in tif_dirread.c. This flaw allows an attacker to exploit this vulnerability via a crafted TIFF file, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054495",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0562",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0865",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064406"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A reachable assertion failure was found in libtiff\u0027s JBIG functionality. This flaw allows an attacker who can submit a crafted file to an application linked with libtiff and using the JBIG functionality, causes a crash via an assertion failure, leading to a denial of service. The exact mechanism and conditions around this issue are dependent on how the application uses libtiff.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: reachable assertion",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064406",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0865",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865"
        }
      ],
      "release_date": "2022-03-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        },
        {
          "category": "workaround",
          "details": "Applications that do not parse files from untrusted/malicious sources will not be affected by this vulnerability.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: reachable assertion"
    },
    {
      "cve": "CVE-2022-0891",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064411"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap buffer overflow in extractImageSection",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The severity of this flaw was changed to Low because it is an out-of-bounds read of 1 byte and in the tiffcrop tool rather than in the library.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064411",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0891",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891"
        }
      ],
      "release_date": "2022-02-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "libtiff: heap buffer overflow in extractImageSection"
    },
    {
      "cve": "CVE-2022-0908",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064145"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in LibTIFF where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchNormalTag() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to cause a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064145",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0908",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c"
    },
    {
      "cve": "CVE-2022-0909",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064146"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A floating-point exception (FPE) flaw was found in LibTIFF\u2019s computeOutputPixelOffsets() function in tiffcrop.c file. This flaw allows an attacker with a crafted TIFF file to trigger a divide-by-zero error, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Divide By Zero error in tiffcrop",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064146",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0909",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Divide By Zero error in tiffcrop"
    },
    {
      "cve": "CVE-2022-0924",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064148"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow flaw was found in Libtiffs\u0027 cpContigBufToSeparateBuf() function of the tiffcp.c file. This flaw allows an attacker with a crafted TIFF file to trigger a heap out-of-bounds read access issue, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Out-of-bounds Read error in tiffcp",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "All versions of Libtiff shipped in Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and since Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope, the issue is not currently planned to be addressed in future updates. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064148",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0924",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Out-of-bounds Read error in tiffcp"
    },
    {
      "cve": "CVE-2022-1354",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074404"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow flaw was found in Libtiffs\u0027 tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In order to successfully exploit this vulberability, the attacker needs to create a specially crafted TIFF file designed to exploit the buffer overflow in the TIFFReadRawDataStriped() function. The attacker must then convince or trick a user into processing the malicious TIFF file using the tiffinfo tool.\n\nConsidering the high bar of prerequisites for successful exploitation, RH ProdSec has set the Impact of this vulnerability to \"Low\"",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1354"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074404",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1354",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354"
        }
      ],
      "release_date": "2022-04-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c"
    },
    {
      "cve": "CVE-2022-1355",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "discovery_date": "2022-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074415"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: stack-buffer-overflow in tiffcp.c in main()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074415",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1355",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355"
        }
      ],
      "release_date": "2022-04-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: stack-buffer-overflow in tiffcp.c in main()"
    },
    {
      "cve": "CVE-2022-22844",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-01-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2042603"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow vulnerability was found in libtiff. This flaw allows an attacker with network access to pass specially crafted files, causing an application to halt or crash. The root cause of this issue was from the memcpy function in tif_unix.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "RHBZ#2042603",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22844",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844"
        }
      ],
      "release_date": "2022-01-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c"
    }
  ]
}
  RHSA-2022:7585
Vulnerability from csaf_redhat
Published
2022-11-08 09:33
    Modified
2025-10-09 21:53
    Summary
Red Hat Security Advisory: libtiff security update
    Notes
Topic
An update for libtiff is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
* libtiff: reachable assertion (CVE-2022-0865)
* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for libtiff is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)\n\n* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)\n\n* libtiff: reachable assertion (CVE-2022-0865)\n\n* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)\n\n* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)\n\n* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)\n\n* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)\n\n* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)\n\n* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:7585",
        "url": "https://access.redhat.com/errata/RHSA-2022:7585"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2042603",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
      },
      {
        "category": "external",
        "summary": "2054494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
      },
      {
        "category": "external",
        "summary": "2054495",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
      },
      {
        "category": "external",
        "summary": "2064145",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
      },
      {
        "category": "external",
        "summary": "2064146",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
      },
      {
        "category": "external",
        "summary": "2064148",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
      },
      {
        "category": "external",
        "summary": "2064406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
      },
      {
        "category": "external",
        "summary": "2064411",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
      },
      {
        "category": "external",
        "summary": "2074415",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7585.json"
      }
    ],
    "title": "Red Hat Security Advisory: libtiff security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:53:41+00:00",
      "generator": {
        "date": "2025-10-09T21:53:41+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:7585",
      "initial_release_date": "2022-11-08T09:33:41+00:00",
      "revision_history": [
        {
          "date": "2022-11-08T09:33:41+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-11-08T09:33:41+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:53:41+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.7.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 8)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 8)",
                  "product_id": "CRB-8.7.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-tools-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-23.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-debugsource-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-23.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-23.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-23.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-devel-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-23.el8?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-tools-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-devel-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-tools-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-23.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-debugsource-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-23.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-23.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-23.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-devel-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-23.el8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-tools-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-23.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-debugsource-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-23.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-debuginfo-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-23.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-23.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-devel-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-23.el8?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.src",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.src",
                  "product_id": "libtiff-0:4.0.9-23.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.i686",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.i686",
                  "product_id": "libtiff-0:4.0.9-23.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-23.el8.i686",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-23.el8.i686",
                  "product_id": "libtiff-devel-0:4.0.9-23.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-23.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-23.el8.i686",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-23.el8.i686",
                  "product_id": "libtiff-debugsource-0:4.0.9-23.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-23.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-23.el8.i686",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-23.el8.i686",
                  "product_id": "libtiff-debuginfo-0:4.0.9-23.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-23.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-23.el8?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.src",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.src",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-0561",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054494"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchStripThing() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to exploit this flaw, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054494",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0561",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0562",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054495"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFReadDirectory() in tif_dirread.c. This flaw allows an attacker to exploit this vulnerability via a crafted TIFF file, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054495",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0562",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0865",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064406"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A reachable assertion failure was found in libtiff\u0027s JBIG functionality. This flaw allows an attacker who can submit a crafted file to an application linked with libtiff and using the JBIG functionality, causes a crash via an assertion failure, leading to a denial of service. The exact mechanism and conditions around this issue are dependent on how the application uses libtiff.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: reachable assertion",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064406",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0865",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865"
        }
      ],
      "release_date": "2022-03-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        },
        {
          "category": "workaround",
          "details": "Applications that do not parse files from untrusted/malicious sources will not be affected by this vulnerability.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: reachable assertion"
    },
    {
      "cve": "CVE-2022-0891",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064411"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap buffer overflow in extractImageSection",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The severity of this flaw was changed to Low because it is an out-of-bounds read of 1 byte and in the tiffcrop tool rather than in the library.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064411",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0891",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891"
        }
      ],
      "release_date": "2022-02-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "libtiff: heap buffer overflow in extractImageSection"
    },
    {
      "cve": "CVE-2022-0908",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064145"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in LibTIFF where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchNormalTag() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to cause a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064145",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0908",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c"
    },
    {
      "cve": "CVE-2022-0909",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064146"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A floating-point exception (FPE) flaw was found in LibTIFF\u2019s computeOutputPixelOffsets() function in tiffcrop.c file. This flaw allows an attacker with a crafted TIFF file to trigger a divide-by-zero error, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Divide By Zero error in tiffcrop",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064146",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0909",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Divide By Zero error in tiffcrop"
    },
    {
      "cve": "CVE-2022-0924",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064148"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow flaw was found in Libtiffs\u0027 cpContigBufToSeparateBuf() function of the tiffcp.c file. This flaw allows an attacker with a crafted TIFF file to trigger a heap out-of-bounds read access issue, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Out-of-bounds Read error in tiffcp",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "All versions of Libtiff shipped in Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and since Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope, the issue is not currently planned to be addressed in future updates. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064148",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0924",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Out-of-bounds Read error in tiffcp"
    },
    {
      "cve": "CVE-2022-1355",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "discovery_date": "2022-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074415"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: stack-buffer-overflow in tiffcp.c in main()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074415",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1355",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355"
        }
      ],
      "release_date": "2022-04-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: stack-buffer-overflow in tiffcp.c in main()"
    },
    {
      "cve": "CVE-2022-22844",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-01-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2042603"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow vulnerability was found in libtiff. This flaw allows an attacker with network access to pass specially crafted files, causing an application to halt or crash. The root cause of this issue was from the memcpy function in tif_unix.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "RHBZ#2042603",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22844",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844"
        }
      ],
      "release_date": "2022-01-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c"
    }
  ]
}
  rhsa-2022_8194
Vulnerability from csaf_redhat
Published
2022-11-15 15:17
    Modified
2024-12-18 15:17
    Summary
Red Hat Security Advisory: libtiff security update
    Notes
Topic
An update for libtiff is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
* libtiff: reachable assertion (CVE-2022-0865)
* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)
* libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c (CVE-2022-1354)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for libtiff is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)\n\n* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)\n\n* libtiff: reachable assertion (CVE-2022-0865)\n\n* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)\n\n* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)\n\n* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)\n\n* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)\n\n* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)\n\n* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)\n\n* libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c (CVE-2022-1354)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:8194",
        "url": "https://access.redhat.com/errata/RHSA-2022:8194"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2042603",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
      },
      {
        "category": "external",
        "summary": "2054494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
      },
      {
        "category": "external",
        "summary": "2054495",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
      },
      {
        "category": "external",
        "summary": "2064145",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
      },
      {
        "category": "external",
        "summary": "2064146",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
      },
      {
        "category": "external",
        "summary": "2064148",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
      },
      {
        "category": "external",
        "summary": "2064406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
      },
      {
        "category": "external",
        "summary": "2064411",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
      },
      {
        "category": "external",
        "summary": "2074404",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
      },
      {
        "category": "external",
        "summary": "2074415",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8194.json"
      }
    ],
    "title": "Red Hat Security Advisory: libtiff security update",
    "tracking": {
      "current_release_date": "2024-12-18T15:17:06+00:00",
      "generator": {
        "date": "2024-12-18T15:17:06+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.3"
        }
      },
      "id": "RHSA-2022:8194",
      "initial_release_date": "2022-11-15T15:17:35+00:00",
      "revision_history": [
        {
          "date": "2022-11-15T15:17:35+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-11-15T15:17:35+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-12-18T15:17:06+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.1.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 9)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 9)",
                  "product_id": "CRB-9.1.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.src",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.src",
                  "product_id": "libtiff-0:4.4.0-2.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.src",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.src",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-0561",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054494"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchStripThing() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to exploit this flaw, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054494",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0561",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0562",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054495"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFReadDirectory() in tif_dirread.c. This flaw allows an attacker to exploit this vulnerability via a crafted TIFF file, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054495",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0562",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0865",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064406"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A reachable assertion failure was found in libtiff\u0027s JBIG functionality. This flaw allows an attacker who can submit a crafted file to an application linked with libtiff and using the JBIG functionality, causes a crash via an assertion failure, leading to a denial of service. The exact mechanism and conditions around this issue are dependent on how the application uses libtiff.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: reachable assertion",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064406",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0865",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865"
        }
      ],
      "release_date": "2022-03-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        },
        {
          "category": "workaround",
          "details": "Applications that do not parse files from untrusted/malicious sources will not be affected by this vulnerability.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: reachable assertion"
    },
    {
      "cve": "CVE-2022-0891",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064411"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap buffer overflow in extractImageSection",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The severity of this flaw was changed to Low because it is an out-of-bounds read of 1 byte and in the tiffcrop tool rather than in the library.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064411",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0891",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891"
        }
      ],
      "release_date": "2022-02-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "libtiff: heap buffer overflow in extractImageSection"
    },
    {
      "cve": "CVE-2022-0908",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064145"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in LibTIFF where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchNormalTag() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to cause a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064145",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0908",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c"
    },
    {
      "cve": "CVE-2022-0909",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064146"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A floating-point exception (FPE) flaw was found in LibTIFF\u2019s computeOutputPixelOffsets() function in tiffcrop.c file. This flaw allows an attacker with a crafted TIFF file to trigger a divide-by-zero error, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Divide By Zero error in tiffcrop",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064146",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0909",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Divide By Zero error in tiffcrop"
    },
    {
      "cve": "CVE-2022-0924",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064148"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow flaw was found in Libtiffs\u0027 cpContigBufToSeparateBuf() function of the tiffcp.c file. This flaw allows an attacker with a crafted TIFF file to trigger a heap out-of-bounds read access issue, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Out-of-bounds Read error in tiffcp",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "All versions of Libtiff shipped in Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and since Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope, the issue is not currently planned to be addressed in future updates. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064148",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0924",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Out-of-bounds Read error in tiffcp"
    },
    {
      "cve": "CVE-2022-1354",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074404"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow flaw was found in Libtiffs\u0027 tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1354"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074404",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1354",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354"
        }
      ],
      "release_date": "2022-04-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c"
    },
    {
      "cve": "CVE-2022-1355",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "discovery_date": "2022-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074415"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: stack-buffer-overflow in tiffcp.c in main()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074415",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1355",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355"
        }
      ],
      "release_date": "2022-04-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: stack-buffer-overflow in tiffcp.c in main()"
    },
    {
      "cve": "CVE-2022-22844",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-01-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2042603"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow vulnerability was found in libtiff. This flaw allows an attacker with network access to pass specially crafted files, causing an application to halt or crash. The root cause of this issue was from the memcpy function in tif_unix.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "RHBZ#2042603",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22844",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844"
        }
      ],
      "release_date": "2022-01-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c"
    }
  ]
}
  rhsa-2022:7585
Vulnerability from csaf_redhat
Published
2022-11-08 09:33
    Modified
2025-10-09 21:53
    Summary
Red Hat Security Advisory: libtiff security update
    Notes
Topic
An update for libtiff is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
* libtiff: reachable assertion (CVE-2022-0865)
* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for libtiff is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)\n\n* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)\n\n* libtiff: reachable assertion (CVE-2022-0865)\n\n* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)\n\n* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)\n\n* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)\n\n* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)\n\n* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)\n\n* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:7585",
        "url": "https://access.redhat.com/errata/RHSA-2022:7585"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2042603",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
      },
      {
        "category": "external",
        "summary": "2054494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
      },
      {
        "category": "external",
        "summary": "2054495",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
      },
      {
        "category": "external",
        "summary": "2064145",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
      },
      {
        "category": "external",
        "summary": "2064146",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
      },
      {
        "category": "external",
        "summary": "2064148",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
      },
      {
        "category": "external",
        "summary": "2064406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
      },
      {
        "category": "external",
        "summary": "2064411",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
      },
      {
        "category": "external",
        "summary": "2074415",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7585.json"
      }
    ],
    "title": "Red Hat Security Advisory: libtiff security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:53:41+00:00",
      "generator": {
        "date": "2025-10-09T21:53:41+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:7585",
      "initial_release_date": "2022-11-08T09:33:41+00:00",
      "revision_history": [
        {
          "date": "2022-11-08T09:33:41+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-11-08T09:33:41+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:53:41+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.7.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 8)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 8)",
                  "product_id": "CRB-8.7.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-tools-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-23.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-debugsource-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-23.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-23.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-23.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-23.el8.aarch64",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-23.el8.aarch64",
                  "product_id": "libtiff-devel-0:4.0.9-23.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-23.el8?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-tools-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-23.el8.ppc64le",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-23.el8.ppc64le",
                  "product_id": "libtiff-devel-0:4.0.9-23.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-23.el8?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-tools-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-23.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-debugsource-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-23.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-23.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-23.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-23.el8.x86_64",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-23.el8.x86_64",
                  "product_id": "libtiff-devel-0:4.0.9-23.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-23.el8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-tools-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-23.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-debugsource-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-23.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-debuginfo-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-23.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-23.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-23.el8.s390x",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-23.el8.s390x",
                  "product_id": "libtiff-devel-0:4.0.9-23.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-23.el8?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.src",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.src",
                  "product_id": "libtiff-0:4.0.9-23.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-23.el8.i686",
                "product": {
                  "name": "libtiff-0:4.0.9-23.el8.i686",
                  "product_id": "libtiff-0:4.0.9-23.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-23.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-23.el8.i686",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-23.el8.i686",
                  "product_id": "libtiff-devel-0:4.0.9-23.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-23.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-23.el8.i686",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-23.el8.i686",
                  "product_id": "libtiff-debugsource-0:4.0.9-23.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-23.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-23.el8.i686",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-23.el8.i686",
                  "product_id": "libtiff-debuginfo-0:4.0.9-23.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-23.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-23.el8?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.src",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.src",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
        "relates_to_product_reference": "CRB-8.7.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-0561",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054494"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchStripThing() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to exploit this flaw, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054494",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0561",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0562",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054495"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFReadDirectory() in tif_dirread.c. This flaw allows an attacker to exploit this vulnerability via a crafted TIFF file, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054495",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0562",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0865",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064406"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A reachable assertion failure was found in libtiff\u0027s JBIG functionality. This flaw allows an attacker who can submit a crafted file to an application linked with libtiff and using the JBIG functionality, causes a crash via an assertion failure, leading to a denial of service. The exact mechanism and conditions around this issue are dependent on how the application uses libtiff.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: reachable assertion",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064406",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0865",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865"
        }
      ],
      "release_date": "2022-03-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        },
        {
          "category": "workaround",
          "details": "Applications that do not parse files from untrusted/malicious sources will not be affected by this vulnerability.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: reachable assertion"
    },
    {
      "cve": "CVE-2022-0891",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064411"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap buffer overflow in extractImageSection",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The severity of this flaw was changed to Low because it is an out-of-bounds read of 1 byte and in the tiffcrop tool rather than in the library.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064411",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0891",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891"
        }
      ],
      "release_date": "2022-02-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "libtiff: heap buffer overflow in extractImageSection"
    },
    {
      "cve": "CVE-2022-0908",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064145"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in LibTIFF where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchNormalTag() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to cause a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064145",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0908",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c"
    },
    {
      "cve": "CVE-2022-0909",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064146"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A floating-point exception (FPE) flaw was found in LibTIFF\u2019s computeOutputPixelOffsets() function in tiffcrop.c file. This flaw allows an attacker with a crafted TIFF file to trigger a divide-by-zero error, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Divide By Zero error in tiffcrop",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064146",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0909",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Divide By Zero error in tiffcrop"
    },
    {
      "cve": "CVE-2022-0924",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064148"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow flaw was found in Libtiffs\u0027 cpContigBufToSeparateBuf() function of the tiffcp.c file. This flaw allows an attacker with a crafted TIFF file to trigger a heap out-of-bounds read access issue, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Out-of-bounds Read error in tiffcp",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "All versions of Libtiff shipped in Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and since Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope, the issue is not currently planned to be addressed in future updates. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064148",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0924",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Out-of-bounds Read error in tiffcp"
    },
    {
      "cve": "CVE-2022-1355",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "discovery_date": "2022-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074415"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: stack-buffer-overflow in tiffcp.c in main()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074415",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1355",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355"
        }
      ],
      "release_date": "2022-04-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: stack-buffer-overflow in tiffcp.c in main()"
    },
    {
      "cve": "CVE-2022-22844",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-01-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2042603"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow vulnerability was found in libtiff. This flaw allows an attacker with network access to pass specially crafted files, causing an application to halt or crash. The root cause of this issue was from the memcpy function in tif_unix.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
          "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
          "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "RHBZ#2042603",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22844",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844"
        }
      ],
      "release_date": "2022-01-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:33:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7585"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "AppStream-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "AppStream-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.src",
            "CRB-8.7.0.GA:libtiff-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debuginfo-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-debugsource-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-devel-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-0:4.0.9-23.el8.x86_64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.aarch64",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.i686",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.ppc64le",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.s390x",
            "CRB-8.7.0.GA:libtiff-tools-debuginfo-0:4.0.9-23.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c"
    }
  ]
}
  wid-sec-w-2022-1250
Vulnerability from csaf_certbund
Published
2022-08-31 22:00
    Modified
2023-06-05 22:00
    Summary
libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service
    Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
    Produktbeschreibung
libTIFF ist ein Softwarepaket für die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).
    Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuführen.
    Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
- Sonstiges
    {
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "libTIFF ist ein Softwarepaket f\u00fcr die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-1250 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1250.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-1250 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1250"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2-2023-2055 vom 2023-06-05",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2055.html"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database - CVE-2022-2520 vom 2022-08-31",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2520"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database - CVE-2022-2520 vom 2022-08-31",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2521"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database - CVE-2022-2520 vom 2022-08-31",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database - CVE-2022-2520 vom 2022-08-31",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354"
      },
      {
        "category": "external",
        "summary": "PoC",
        "url": "https://gitlab.com/libtiff/libtiff/-/issues/424"
      },
      {
        "category": "external",
        "summary": "PoC",
        "url": "https://gitlab.com/libtiff/libtiff/-/issues/422"
      },
      {
        "category": "external",
        "summary": "PoC",
        "url": "https://gitlab.com/libtiff/libtiff/-/issues/400"
      },
      {
        "category": "external",
        "summary": "PoC",
        "url": "https://gitlab.com/libtiff/libtiff/-/issues/319"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5619-1 vom 2022-09-20",
        "url": "https://ubuntu.com/security/notices/USN-5619-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:3679-1 vom 2022-10-20",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:3690-1 vom 2022-10-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-183 vom 2022-11-04",
        "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-183.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5714-1 vom 2022-11-08",
        "url": "https://ubuntu.com/security/notices/USN-5714-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:7585 vom 2022-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2022:7585"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:8194 vom 2022-11-15",
        "url": "https://access.redhat.com/errata/RHSA-2022:8194"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-7585 vom 2022-11-15",
        "url": "https://linux.oracle.com/errata/ELSA-2022-7585.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-1891 vom 2022-12-07",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1891.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:8781 vom 2022-12-08",
        "url": "https://access.redhat.com/errata/RHSA-2022:8781"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-1644 vom 2022-12-10",
        "url": "https://alas.aws.amazon.com/ALAS-2022-1644.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-0095 vom 2023-01-12",
        "url": "https://linux.oracle.com/errata/ELSA-2023-0095.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-3278 vom 2023-01-20",
        "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-0302 vom 2023-01-24",
        "url": "https://linux.oracle.com/errata/ELSA-2023-0302.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:0302 vom 2023-01-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:0302"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5333 vom 2023-01-29",
        "url": "https://www.debian.org/security/2023/dsa-5333"
      }
    ],
    "source_lang": "en-US",
    "title": "libTIFF: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
    "tracking": {
      "current_release_date": "2023-06-05T22:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:34:21.452+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2022-1250",
      "initial_release_date": "2022-08-31T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-08-31T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2022-09-07T22:00:00.000+00:00",
          "number": "2",
          "summary": "Exploit aufgenommen"
        },
        {
          "date": "2022-09-19T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2022-10-20T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-10-23T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-11-06T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-11-07T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2022-11-08T23:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-11-15T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2022-12-06T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-12-07T23:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-12-11T23:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2023-01-12T23:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2023-01-22T23:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2023-01-23T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
        },
        {
          "date": "2023-01-29T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2023-06-05T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Amazon aufgenommen"
        }
      ],
      "status": "final",
      "version": "17"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Open Source libTIFF",
                "product": {
                  "name": "Open Source libTIFF",
                  "product_id": "T001217",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:libtiff:libtiff:-"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Open Source libTIFF 4.4.0rc1",
                "product": {
                  "name": "Open Source libTIFF 4.4.0rc1",
                  "product_id": "T024307",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:libtiff:libtiff:4.4.0rc1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "libTIFF"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Red Hat OpenShift",
            "product": {
              "name": "Red Hat OpenShift",
              "product_id": "T008027",
              "product_identification_helper": {
                "cpe": "cpe:/a:redhat:openshift:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-1354",
      "notes": [
        {
          "category": "description",
          "text": "In libTIFF existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer fehlgeschlagenen sysmalloc-Assertion in rotateImage(), einer ung\u00fcltigen Zeigerfreigabeoperation in TIFFClose(), einem Stack-Puffer\u00fcberlauf in tiffcp.c in der Funktion main() und einem Heap-Puffer\u00fcberlauf in tiffinfo.c in der Funktion TIFFReadRawDataStriped(). Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T024307",
          "T008027",
          "2951",
          "T001217",
          "T002207",
          "67646",
          "T000126",
          "398363",
          "T004914"
        ]
      },
      "release_date": "2022-08-31T22:00:00.000+00:00",
      "title": "CVE-2022-1354"
    },
    {
      "cve": "CVE-2022-1355",
      "notes": [
        {
          "category": "description",
          "text": "In libTIFF existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer fehlgeschlagenen sysmalloc-Assertion in rotateImage(), einer ung\u00fcltigen Zeigerfreigabeoperation in TIFFClose(), einem Stack-Puffer\u00fcberlauf in tiffcp.c in der Funktion main() und einem Heap-Puffer\u00fcberlauf in tiffinfo.c in der Funktion TIFFReadRawDataStriped(). Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T024307",
          "T008027",
          "2951",
          "T001217",
          "T002207",
          "67646",
          "T000126",
          "398363",
          "T004914"
        ]
      },
      "release_date": "2022-08-31T22:00:00.000+00:00",
      "title": "CVE-2022-1355"
    },
    {
      "cve": "CVE-2022-2520",
      "notes": [
        {
          "category": "description",
          "text": "In libTIFF existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer fehlgeschlagenen sysmalloc-Assertion in rotateImage(), einer ung\u00fcltigen Zeigerfreigabeoperation in TIFFClose(), einem Stack-Puffer\u00fcberlauf in tiffcp.c in der Funktion main() und einem Heap-Puffer\u00fcberlauf in tiffinfo.c in der Funktion TIFFReadRawDataStriped(). Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T024307",
          "T008027",
          "2951",
          "T001217",
          "T002207",
          "67646",
          "T000126",
          "398363",
          "T004914"
        ]
      },
      "release_date": "2022-08-31T22:00:00.000+00:00",
      "title": "CVE-2022-2520"
    },
    {
      "cve": "CVE-2022-2521",
      "notes": [
        {
          "category": "description",
          "text": "In libTIFF existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer fehlgeschlagenen sysmalloc-Assertion in rotateImage(), einer ung\u00fcltigen Zeigerfreigabeoperation in TIFFClose(), einem Stack-Puffer\u00fcberlauf in tiffcp.c in der Funktion main() und einem Heap-Puffer\u00fcberlauf in tiffinfo.c in der Funktion TIFFReadRawDataStriped(). Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T024307",
          "T008027",
          "2951",
          "T001217",
          "T002207",
          "67646",
          "T000126",
          "398363",
          "T004914"
        ]
      },
      "release_date": "2022-08-31T22:00:00.000+00:00",
      "title": "CVE-2022-2521"
    }
  ]
}
  WID-SEC-W-2022-1250
Vulnerability from csaf_certbund
Published
2022-08-31 22:00
    Modified
2023-06-05 22:00
    Summary
libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service
    Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
    Produktbeschreibung
libTIFF ist ein Softwarepaket für die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).
    Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuführen.
    Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
- Sonstiges
    {
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "libTIFF ist ein Softwarepaket f\u00fcr die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-1250 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1250.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-1250 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1250"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2-2023-2055 vom 2023-06-05",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2055.html"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database - CVE-2022-2520 vom 2022-08-31",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2520"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database - CVE-2022-2520 vom 2022-08-31",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2521"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database - CVE-2022-2520 vom 2022-08-31",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database - CVE-2022-2520 vom 2022-08-31",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354"
      },
      {
        "category": "external",
        "summary": "PoC",
        "url": "https://gitlab.com/libtiff/libtiff/-/issues/424"
      },
      {
        "category": "external",
        "summary": "PoC",
        "url": "https://gitlab.com/libtiff/libtiff/-/issues/422"
      },
      {
        "category": "external",
        "summary": "PoC",
        "url": "https://gitlab.com/libtiff/libtiff/-/issues/400"
      },
      {
        "category": "external",
        "summary": "PoC",
        "url": "https://gitlab.com/libtiff/libtiff/-/issues/319"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5619-1 vom 2022-09-20",
        "url": "https://ubuntu.com/security/notices/USN-5619-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:3679-1 vom 2022-10-20",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:3690-1 vom 2022-10-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-183 vom 2022-11-04",
        "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-183.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5714-1 vom 2022-11-08",
        "url": "https://ubuntu.com/security/notices/USN-5714-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:7585 vom 2022-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2022:7585"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:8194 vom 2022-11-15",
        "url": "https://access.redhat.com/errata/RHSA-2022:8194"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-7585 vom 2022-11-15",
        "url": "https://linux.oracle.com/errata/ELSA-2022-7585.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-1891 vom 2022-12-07",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1891.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:8781 vom 2022-12-08",
        "url": "https://access.redhat.com/errata/RHSA-2022:8781"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-1644 vom 2022-12-10",
        "url": "https://alas.aws.amazon.com/ALAS-2022-1644.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-0095 vom 2023-01-12",
        "url": "https://linux.oracle.com/errata/ELSA-2023-0095.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-3278 vom 2023-01-20",
        "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-0302 vom 2023-01-24",
        "url": "https://linux.oracle.com/errata/ELSA-2023-0302.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:0302 vom 2023-01-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:0302"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5333 vom 2023-01-29",
        "url": "https://www.debian.org/security/2023/dsa-5333"
      }
    ],
    "source_lang": "en-US",
    "title": "libTIFF: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
    "tracking": {
      "current_release_date": "2023-06-05T22:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:34:21.452+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2022-1250",
      "initial_release_date": "2022-08-31T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-08-31T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2022-09-07T22:00:00.000+00:00",
          "number": "2",
          "summary": "Exploit aufgenommen"
        },
        {
          "date": "2022-09-19T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2022-10-20T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-10-23T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-11-06T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-11-07T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2022-11-08T23:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-11-15T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2022-12-06T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-12-07T23:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-12-11T23:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2023-01-12T23:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2023-01-22T23:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2023-01-23T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
        },
        {
          "date": "2023-01-29T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2023-06-05T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Amazon aufgenommen"
        }
      ],
      "status": "final",
      "version": "17"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Open Source libTIFF",
                "product": {
                  "name": "Open Source libTIFF",
                  "product_id": "T001217",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:libtiff:libtiff:-"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Open Source libTIFF 4.4.0rc1",
                "product": {
                  "name": "Open Source libTIFF 4.4.0rc1",
                  "product_id": "T024307",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:libtiff:libtiff:4.4.0rc1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "libTIFF"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Red Hat OpenShift",
            "product": {
              "name": "Red Hat OpenShift",
              "product_id": "T008027",
              "product_identification_helper": {
                "cpe": "cpe:/a:redhat:openshift:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-1354",
      "notes": [
        {
          "category": "description",
          "text": "In libTIFF existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer fehlgeschlagenen sysmalloc-Assertion in rotateImage(), einer ung\u00fcltigen Zeigerfreigabeoperation in TIFFClose(), einem Stack-Puffer\u00fcberlauf in tiffcp.c in der Funktion main() und einem Heap-Puffer\u00fcberlauf in tiffinfo.c in der Funktion TIFFReadRawDataStriped(). Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T024307",
          "T008027",
          "2951",
          "T001217",
          "T002207",
          "67646",
          "T000126",
          "398363",
          "T004914"
        ]
      },
      "release_date": "2022-08-31T22:00:00.000+00:00",
      "title": "CVE-2022-1354"
    },
    {
      "cve": "CVE-2022-1355",
      "notes": [
        {
          "category": "description",
          "text": "In libTIFF existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer fehlgeschlagenen sysmalloc-Assertion in rotateImage(), einer ung\u00fcltigen Zeigerfreigabeoperation in TIFFClose(), einem Stack-Puffer\u00fcberlauf in tiffcp.c in der Funktion main() und einem Heap-Puffer\u00fcberlauf in tiffinfo.c in der Funktion TIFFReadRawDataStriped(). Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T024307",
          "T008027",
          "2951",
          "T001217",
          "T002207",
          "67646",
          "T000126",
          "398363",
          "T004914"
        ]
      },
      "release_date": "2022-08-31T22:00:00.000+00:00",
      "title": "CVE-2022-1355"
    },
    {
      "cve": "CVE-2022-2520",
      "notes": [
        {
          "category": "description",
          "text": "In libTIFF existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer fehlgeschlagenen sysmalloc-Assertion in rotateImage(), einer ung\u00fcltigen Zeigerfreigabeoperation in TIFFClose(), einem Stack-Puffer\u00fcberlauf in tiffcp.c in der Funktion main() und einem Heap-Puffer\u00fcberlauf in tiffinfo.c in der Funktion TIFFReadRawDataStriped(). Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T024307",
          "T008027",
          "2951",
          "T001217",
          "T002207",
          "67646",
          "T000126",
          "398363",
          "T004914"
        ]
      },
      "release_date": "2022-08-31T22:00:00.000+00:00",
      "title": "CVE-2022-2520"
    },
    {
      "cve": "CVE-2022-2521",
      "notes": [
        {
          "category": "description",
          "text": "In libTIFF existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer fehlgeschlagenen sysmalloc-Assertion in rotateImage(), einer ung\u00fcltigen Zeigerfreigabeoperation in TIFFClose(), einem Stack-Puffer\u00fcberlauf in tiffcp.c in der Funktion main() und einem Heap-Puffer\u00fcberlauf in tiffinfo.c in der Funktion TIFFReadRawDataStriped(). Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T024307",
          "T008027",
          "2951",
          "T001217",
          "T002207",
          "67646",
          "T000126",
          "398363",
          "T004914"
        ]
      },
      "release_date": "2022-08-31T22:00:00.000+00:00",
      "title": "CVE-2022-2521"
    }
  ]
}
  ghsa-2fqh-vmvf-c822
Vulnerability from github
Published
2022-09-01 00:00
    Modified
2023-01-21 03:30
    
        Severity ?
      
      
    
        VLAI Severity ?
      
      Details
A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.
{
  "affected": [],
  "aliases": [
    "CVE-2022-1355"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-119",
      "CWE-121"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2022-08-31T16:15:00Z",
    "severity": "MODERATE"
  },
  "details": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.",
  "id": "GHSA-2fqh-vmvf-c822",
  "modified": "2023-01-21T03:30:28Z",
  "published": "2022-09-01T00:00:22Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2022:7585"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2022:8194"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/security/cve/CVE-2022-1355"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
    },
    {
      "type": "WEB",
      "url": "https://gitlab.com/libtiff/libtiff/-/issues/400"
    },
    {
      "type": "WEB",
      "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/323"
    },
    {
      "type": "WEB",
      "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
    },
    {
      "type": "WEB",
      "url": "https://security.gentoo.org/glsa/202210-10"
    },
    {
      "type": "WEB",
      "url": "https://security.netapp.com/advisory/ntap-20221014-0007"
    },
    {
      "type": "WEB",
      "url": "https://www.debian.org/security/2023/dsa-5333"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  cnvd-2022-72097
Vulnerability from cnvd
Title
LibTIFF缓冲区溢出漏洞(CNVD-2022-72097)
Description
LibTIFF是一个读写TIFF(标签图像文件格式)文件的库。该库包含一些处理TIFF文件的命令行工具。
LibTIFF存在安全漏洞,该漏洞源于在tiffcp.c的main()函数中发现存在栈缓冲区溢出缺陷。攻击者可利用该漏洞将特制的TIFF文件传递给tiffcp工具,从而触发堆栈缓冲区溢出问题,导致损坏内存,并导致拒绝服务。
Severity
中
        VLAI Severity ?
      
      Patch Name
LibTIFF缓冲区溢出漏洞(CNVD-2022-72097)的补丁
Patch Description
LibTIFF是一个读写TIFF(标签图像文件格式)文件的库。该库包含一些处理TIFF文件的命令行工具。
LibTIFF存在安全漏洞,该漏洞源于在tiffcp.c的main()函数中发现存在栈缓冲区溢出缺陷。攻击者可利用该漏洞将特制的TIFF文件传递给tiffcp工具,从而触发堆栈缓冲区溢出问题,导致损坏内存,并导致拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/fb1db384959698edd6caeea84e28253d272a0f96
Reference
https://nvd.nist.gov/vuln/detail/CVE-2022-1355
Impacted products
          | Name | Libtiff LibTiff <4.4.0 | 
|---|
{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2022-1355",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355"
    }
  },
  "description": "LibTIFF\u662f\u4e00\u4e2a\u8bfb\u5199TIFF\uff08\u6807\u7b7e\u56fe\u50cf\u6587\u4ef6\u683c\u5f0f\uff09\u6587\u4ef6\u7684\u5e93\u3002\u8be5\u5e93\u5305\u542b\u4e00\u4e9b\u5904\u7406TIFF\u6587\u4ef6\u7684\u547d\u4ee4\u884c\u5de5\u5177\u3002\n\nLibTIFF\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5728tiffcp.c\u7684main()\u51fd\u6570\u4e2d\u53d1\u73b0\u5b58\u5728\u6808\u7f13\u51b2\u533a\u6ea2\u51fa\u7f3a\u9677\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5c06\u7279\u5236\u7684TIFF\u6587\u4ef6\u4f20\u9012\u7ed9tiffcp\u5de5\u5177\uff0c\u4ece\u800c\u89e6\u53d1\u5806\u6808\u7f13\u51b2\u533a\u6ea2\u51fa\u95ee\u9898\uff0c\u5bfc\u81f4\u635f\u574f\u5185\u5b58\uff0c\u5e76\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/fb1db384959698edd6caeea84e28253d272a0f96",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2022-72097",
  "openTime": "2022-10-28",
  "patchDescription": "LibTIFF\u662f\u4e00\u4e2a\u8bfb\u5199TIFF\uff08\u6807\u7b7e\u56fe\u50cf\u6587\u4ef6\u683c\u5f0f\uff09\u6587\u4ef6\u7684\u5e93\u3002\u8be5\u5e93\u5305\u542b\u4e00\u4e9b\u5904\u7406TIFF\u6587\u4ef6\u7684\u547d\u4ee4\u884c\u5de5\u5177\u3002\r\n\r\nLibTIFF\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5728tiffcp.c\u7684main()\u51fd\u6570\u4e2d\u53d1\u73b0\u5b58\u5728\u6808\u7f13\u51b2\u533a\u6ea2\u51fa\u7f3a\u9677\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5c06\u7279\u5236\u7684TIFF\u6587\u4ef6\u4f20\u9012\u7ed9tiffcp\u5de5\u5177\uff0c\u4ece\u800c\u89e6\u53d1\u5806\u6808\u7f13\u51b2\u533a\u6ea2\u51fa\u95ee\u9898\uff0c\u5bfc\u81f4\u635f\u574f\u5185\u5b58\uff0c\u5e76\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "LibTIFF\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2022-72097\uff09\u7684\u8865\u4e01",
  "products": {
    "product": "Libtiff LibTiff \u003c4.4.0"
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355",
  "serverity": "\u4e2d",
  "submitTime": "2022-09-05",
  "title": "LibTIFF\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2022-72097\uff09"
}
  fkie_cve-2022-1355
Vulnerability from fkie_nvd
Published
2022-08-31 16:15
    Modified
2024-11-21 06:40
    
          Severity ?
        
        
    Summary
A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.
    References
      | URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2022-1355 | Issue Tracking, Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2074415 | Exploit, Issue Tracking, Third Party Advisory | |
| secalert@redhat.com | https://gitlab.com/libtiff/libtiff/-/issues/400 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
| secalert@redhat.com | https://gitlab.com/libtiff/libtiff/-/merge_requests/323 | Issue Tracking, Patch, Third Party Advisory | |
| secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html | Mailing List, Third Party Advisory | |
| secalert@redhat.com | https://security.gentoo.org/glsa/202210-10 | Third Party Advisory | |
| secalert@redhat.com | https://security.netapp.com/advisory/ntap-20221014-0007/ | Third Party Advisory | |
| secalert@redhat.com | https://www.debian.org/security/2023/dsa-5333 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2022-1355 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2074415 | Exploit, Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.com/libtiff/libtiff/-/issues/400 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.com/libtiff/libtiff/-/merge_requests/323 | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202210-10 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20221014-0007/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2023/dsa-5333 | Third Party Advisory | 
Impacted products
      | Vendor | Product | Version | |
|---|---|---|---|
| libtiff | libtiff | * | |
| fedoraproject | fedora | 34 | |
| fedoraproject | fedora | 35 | |
| fedoraproject | fedora | 36 | |
| redhat | enterprise_linux | 7.0 | |
| redhat | enterprise_linux | 8.0 | |
| redhat | enterprise_linux | 9.0 | |
| netapp | ontap_select_deploy_administration_utility | - | |
| debian | debian_linux | 10.0 | |
| debian | debian_linux | 11.0 | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "089A82D2-D7BA-42E9-961F-A61E72537850",
              "versionEndExcluding": "4.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado un fallo de desbordamiento del b\u00fafer de la pila en la funci\u00f3n main() del archivo tiffcp.c de Libtiffs. Este defecto permite a un atacante pasar un archivo TIFF dise\u00f1ado a la herramienta tiffcp, desencadenando un problema de desbordamiento del b\u00fafer de la pila, posiblemente corrompiendo la memoria, y causando un fallo que conlleva a una denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2022-1355",
  "lastModified": "2024-11-21T06:40:33.603",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 4.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-31T16:15:09.577",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2022-1355"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/libtiff/libtiff/-/issues/400"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/323"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202210-10"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20221014-0007/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5333"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2022-1355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/libtiff/libtiff/-/issues/400"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/323"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202210-10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20221014-0007/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5333"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-121"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Secondary"
    }
  ]
}
  gsd-2022-1355
Vulnerability from gsd
Modified
2023-12-13 01:19
      Details
        
          A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.
        
      Aliases
        
      Aliases
        
      {
  "GSD": {
    "alias": "CVE-2022-1355",
    "description": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.",
    "id": "GSD-2022-1355",
    "references": [
      "https://www.suse.com/security/cve/CVE-2022-1355.html",
      "https://security.archlinux.org/CVE-2022-1355",
      "https://advisories.mageia.org/CVE-2022-1355.html",
      "https://alas.aws.amazon.com/cve/html/CVE-2022-1355.html",
      "https://access.redhat.com/errata/RHSA-2022:7585",
      "https://access.redhat.com/errata/RHSA-2022:8194",
      "https://ubuntu.com/security/CVE-2022-1355",
      "https://www.debian.org/security/2023/dsa-5333"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2022-1355"
      ],
      "details": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.",
      "id": "GSD-2022-1355",
      "modified": "2023-12-13T01:19:27.894690Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secalert@redhat.com",
        "ID": "CVE-2022-1355",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "libtiff",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "Not-Known"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "cweId": "CWE-121",
                "lang": "eng",
                "value": "CWE-121 - Stack-based Buffer Overflow."
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415",
            "refsource": "MISC",
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
          },
          {
            "name": "https://gitlab.com/libtiff/libtiff/-/issues/400",
            "refsource": "MISC",
            "url": "https://gitlab.com/libtiff/libtiff/-/issues/400"
          },
          {
            "name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/323",
            "refsource": "MISC",
            "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/323"
          },
          {
            "name": "https://access.redhat.com/security/cve/CVE-2022-1355",
            "refsource": "MISC",
            "url": "https://access.redhat.com/security/cve/CVE-2022-1355"
          },
          {
            "name": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html",
            "refsource": "MISC",
            "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
          },
          {
            "name": "https://security.gentoo.org/glsa/202210-10",
            "refsource": "MISC",
            "url": "https://security.gentoo.org/glsa/202210-10"
          },
          {
            "name": "https://security.netapp.com/advisory/ntap-20221014-0007/",
            "refsource": "MISC",
            "url": "https://security.netapp.com/advisory/ntap-20221014-0007/"
          },
          {
            "name": "https://www.debian.org/security/2023/dsa-5333",
            "refsource": "MISC",
            "url": "https://www.debian.org/security/2023/dsa-5333"
          }
        ]
      }
    },
    "gitlab.com": {
      "advisories": [
        {
          "affected_range": "\u003c4.4.0",
          "affected_versions": "All versions before 4.4.0",
          "cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H",
          "cwe_ids": [
            "CWE-1035",
            "CWE-121",
            "CWE-937"
          ],
          "date": "2023-02-23",
          "description": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.",
          "fixed_versions": [
            "4.4.0"
          ],
          "identifier": "CVE-2022-1355",
          "identifiers": [
            "CVE-2022-1355"
          ],
          "not_impacted": "All versions starting from 4.4.0",
          "package_slug": "conan/libtiff",
          "pubdate": "2022-08-31",
          "solution": "Upgrade to version 4.4.0 or above.",
          "title": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "urls": [
            "https://nvd.nist.gov/vuln/detail/CVE-2022-1355",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2074415",
            "https://gitlab.com/libtiff/libtiff/-/issues/400",
            "https://access.redhat.com/security/cve/CVE-2022-1355",
            "https://gitlab.com/libtiff/libtiff/-/merge_requests/323"
          ],
          "uuid": "f7175971-3e7a-4777-b153-463cef6e2332"
        }
      ]
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "4.4.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2022-1355"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-121"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415",
              "refsource": "MISC",
              "tags": [
                "Exploit",
                "Issue Tracking",
                "Third Party Advisory"
              ],
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
            },
            {
              "name": "https://gitlab.com/libtiff/libtiff/-/issues/400",
              "refsource": "MISC",
              "tags": [
                "Exploit",
                "Issue Tracking",
                "Patch",
                "Third Party Advisory"
              ],
              "url": "https://gitlab.com/libtiff/libtiff/-/issues/400"
            },
            {
              "name": "https://access.redhat.com/security/cve/CVE-2022-1355",
              "refsource": "MISC",
              "tags": [
                "Issue Tracking",
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/security/cve/CVE-2022-1355"
            },
            {
              "name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/323",
              "refsource": "MISC",
              "tags": [
                "Issue Tracking",
                "Patch",
                "Third Party Advisory"
              ],
              "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/323"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20221014-0007/",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://security.netapp.com/advisory/ntap-20221014-0007/"
            },
            {
              "name": "GLSA-202210-10",
              "refsource": "GENTOO",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://security.gentoo.org/glsa/202210-10"
            },
            {
              "name": "[debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
            },
            {
              "name": "DSA-5333",
              "refsource": "DEBIAN",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.debian.org/security/2023/dsa-5333"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "exploitabilityScore": 1.8,
          "impactScore": 4.2
        }
      },
      "lastModifiedDate": "2023-02-23T15:52Z",
      "publishedDate": "2022-08-31T16:15Z"
    }
  }
}
  Loading…
      Loading…
      Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
      Loading…