rhsa-2023_2340
Vulnerability from csaf_redhat
Published
2023-05-09 10:02
Modified
2024-11-22 21:20
Summary
Red Hat Security Advisory: libtiff security update
Notes
Topic
An update for libtiff is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: heap Buffer overflows in tiffcrop.c (CVE-2022-3570)
* libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix (CVE-2022-3597)
* libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c (CVE-2022-3598)
* libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c (CVE-2022-3599)
* libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c (CVE-2022-3626)
* libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (CVE-2022-3627)
* libtiff: integer overflow in function TIFFReadRGBATileExt of the file (CVE-2022-3970)
* libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c (CVE-2022-4645)
* libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value (CVE-2023-30774)
* libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c (CVE-2023-30775)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libtiff is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: heap Buffer overflows in tiffcrop.c (CVE-2022-3570)\n\n* libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix (CVE-2022-3597)\n\n* libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c (CVE-2022-3598)\n\n* libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c (CVE-2022-3599)\n\n* libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c (CVE-2022-3626)\n\n* libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (CVE-2022-3627)\n\n* libtiff: integer overflow in function TIFFReadRGBATileExt of the file (CVE-2022-3970)\n\n* libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c (CVE-2022-4645)\n\n* libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value (CVE-2023-30774)\n\n* libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c (CVE-2023-30775)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2340",
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index"
},
{
"category": "external",
"summary": "2142734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142734"
},
{
"category": "external",
"summary": "2142736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142736"
},
{
"category": "external",
"summary": "2142738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142738"
},
{
"category": "external",
"summary": "2142740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142740"
},
{
"category": "external",
"summary": "2142741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142741"
},
{
"category": "external",
"summary": "2142742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142742"
},
{
"category": "external",
"summary": "2148918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148918"
},
{
"category": "external",
"summary": "2176220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176220"
},
{
"category": "external",
"summary": "2187139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187139"
},
{
"category": "external",
"summary": "2187141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2340.json"
}
],
"title": "Red Hat Security Advisory: libtiff security update",
"tracking": {
"current_release_date": "2024-11-22T21:20:57+00:00",
"generator": {
"date": "2024-11-22T21:20:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:2340",
"initial_release_date": "2023-05-09T10:02:52+00:00",
"revision_history": [
{
"date": "2023-05-09T10:02:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-09T10:02:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T21:20:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-7.el9.src",
"product": {
"name": "libtiff-0:4.4.0-7.el9.src",
"product_id": "libtiff-0:4.4.0-7.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-7.el9.aarch64",
"product": {
"name": "libtiff-0:4.4.0-7.el9.aarch64",
"product_id": "libtiff-0:4.4.0-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-7.el9.aarch64",
"product": {
"name": "libtiff-devel-0:4.4.0-7.el9.aarch64",
"product_id": "libtiff-devel-0:4.4.0-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"product": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"product_id": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"product_id": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-7.el9.aarch64",
"product": {
"name": "libtiff-tools-0:4.4.0-7.el9.aarch64",
"product_id": "libtiff-tools-0:4.4.0-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-7.el9.ppc64le",
"product": {
"name": "libtiff-0:4.4.0-7.el9.ppc64le",
"product_id": "libtiff-0:4.4.0-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
"product": {
"name": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
"product_id": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"product": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"product_id": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"product_id": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
"product": {
"name": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
"product_id": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-7.el9.i686",
"product": {
"name": "libtiff-0:4.4.0-7.el9.i686",
"product_id": "libtiff-0:4.4.0-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-7.el9.i686",
"product": {
"name": "libtiff-devel-0:4.4.0-7.el9.i686",
"product_id": "libtiff-devel-0:4.4.0-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-7.el9.i686",
"product": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.i686",
"product_id": "libtiff-debugsource-0:4.4.0-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
"product_id": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-7.el9.x86_64",
"product": {
"name": "libtiff-0:4.4.0-7.el9.x86_64",
"product_id": "libtiff-0:4.4.0-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-7.el9.x86_64",
"product": {
"name": "libtiff-devel-0:4.4.0-7.el9.x86_64",
"product_id": "libtiff-devel-0:4.4.0-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"product": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"product_id": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"product_id": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-7.el9.x86_64",
"product": {
"name": "libtiff-tools-0:4.4.0-7.el9.x86_64",
"product_id": "libtiff-tools-0:4.4.0-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-7.el9.s390x",
"product": {
"name": "libtiff-0:4.4.0-7.el9.s390x",
"product_id": "libtiff-0:4.4.0-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-7.el9.s390x",
"product": {
"name": "libtiff-devel-0:4.4.0-7.el9.s390x",
"product_id": "libtiff-devel-0:4.4.0-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
"product": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
"product_id": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"product_id": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-7.el9.s390x",
"product": {
"name": "libtiff-tools-0:4.4.0-7.el9.s390x",
"product_id": "libtiff-tools-0:4.4.0-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src"
},
"product_reference": "libtiff-0:4.4.0-7.el9.src",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-tools-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-tools-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-tools-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src"
},
"product_reference": "libtiff-0:4.4.0-7.el9.src",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-tools-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-tools-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-tools-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.2.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3570",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-10-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2142734"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs during the conversion of a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes an out-of-bound access resulting an application crash, eventually leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: heap Buffer overflows in tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3570"
},
{
"category": "external",
"summary": "RHBZ#2142734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142734"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3570",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3570"
}
],
"release_date": "2022-02-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: heap Buffer overflows in tiffcrop.c"
},
{
"cve": "CVE-2022-3597",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-10-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2142736"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the _TIFFmemcpy function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3597"
},
{
"category": "external",
"summary": "RHBZ#2142736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142736"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3597",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3597"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix"
},
{
"cve": "CVE-2022-3598",
"discovery_date": "2022-10-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2142738"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the extractContigSamplesShifted24bits function in tools/tiffcrop.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3598"
},
{
"category": "external",
"summary": "RHBZ#2142738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142738"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3598"
}
],
"release_date": "2022-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c"
},
{
"cve": "CVE-2022-3599",
"discovery_date": "2022-10-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2142740"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in the writeSingleSection function in tools/tiffcrop.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3599"
},
{
"category": "external",
"summary": "RHBZ#2142740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142740"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3599",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3599"
}
],
"release_date": "2022-02-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c"
},
{
"cve": "CVE-2022-3626",
"discovery_date": "2022-10-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2142741"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the _TIFFmemset function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3626"
},
{
"category": "external",
"summary": "RHBZ#2142741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3626",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3626"
}
],
"release_date": "2022-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c"
},
{
"cve": "CVE-2022-3627",
"discovery_date": "2022-10-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2142742"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the _TIFFmemcpy function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3627"
},
{
"category": "external",
"summary": "RHBZ#2142742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142742"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3627",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3627"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c"
},
{
"cve": "CVE-2022-3970",
"cwe": {
"id": "CWE-680",
"name": "Integer Overflow to Buffer Overflow"
},
"discovery_date": "2022-11-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2148918"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in LibTIFF. This issue exists in the TIFFReadRGBATileExt function of the libtiff/tif_getimage.c file, and may lead to a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: integer overflow in function TIFFReadRGBATileExt of the file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product security rated this issue having Moderate security impact as the exploitation of this issue will most likely to cause a denial of service attack. The score is based on the worst case scenario that an attacker might use the integer overflow to trigger other vulnerabilities such as buffer overflow, that could result in more adverse effects.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3970"
},
{
"category": "external",
"summary": "RHBZ#2148918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3970"
}
],
"release_date": "2022-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: integer overflow in function TIFFReadRGBATileExt of the file"
},
{
"cve": "CVE-2022-4645",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-03-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2176220"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in tiffcp, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the tiffcp function in tools/tiffcp.c, resulting in a denial of service and limited information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libtiff is a general purpose library to manipulate TIFF images. The library itself is not used directly, it\u0027s used via another application linked with the library, which means this issue can only be triggered by an application processing untrusted images. Therefore, if there is no way an attacker can provide a crafted image to an application, it\u0027s likely not possible to exploit this CVE.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4645"
},
{
"category": "external",
"summary": "RHBZ#2176220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645"
}
],
"release_date": "2023-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c"
},
{
"cve": "CVE-2023-30086",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-05-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2203650"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the libtiff library. This flaw causes a buffer overflow in libtiff that allows a local attacker to cause a denial of service via the tiffcp function in tiffcp.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Heap buffer overflow in tiffcp() at tiffcp.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-30086"
},
{
"category": "external",
"summary": "RHBZ#2203650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203650"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30086"
}
],
"release_date": "2023-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Heap buffer overflow in tiffcp() at tiffcp.c"
},
{
"cve": "CVE-2023-30774",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187139"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the libtiff library. This flaw causes a heap buffer overflow issue via the TIFFTAG_INKNAMES and TIFFTAG_NUMBEROFINKS values.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-30774"
},
{
"category": "external",
"summary": "RHBZ#2187139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30774",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30774"
}
],
"release_date": "2023-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value"
},
{
"cve": "CVE-2023-30775",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187141"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-30775"
},
{
"category": "external",
"summary": "RHBZ#2187141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-30775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30775",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30775"
}
],
"release_date": "2023-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…