[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2022:8194-01 -- Redhat libtiff

ID: oval:org.secpod.oval:def:507369Date: (C)2022-11-23   (M)2023-12-26
Class: PATCHFamily: unix




The libtiff packages contain a library of functions for manipulating Tagged Image File Format files. Security Fix: * libtiff: Denial of Service via crafted TIFF file * libtiff: Null source pointer lead to Denial of Service via crafted TIFF file * libtiff: reachable assertion * libtiff: Out-of-bounds Read error in tiffcp * libtiff: stack-buffer-overflow in tiffcp.c in main * libtiff: out-of-bounds read in _TIFFmemcpy in tif_unix.c * libtiff: heap buffer overflow in extractImageSection * tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag in tif_dirread.c * tiff: Divide By Zero error in tiffcrop * libtiff: heap-buffer-overflow in TIFFReadRawDataStriped in tiffinfo.c For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.

Platform:
Red Hat Enterprise Linux 9
Product:
libtiff
Reference:
RHSA-2022:8194-01
CVE-2022-0561
CVE-2022-0562
CVE-2022-0865
CVE-2022-0891
CVE-2022-0908
CVE-2022-0909
CVE-2022-0924
CVE-2022-1354
CVE-2022-1355
CVE-2022-22844
CVE    10
CVE-2022-0561
CVE-2022-0562
CVE-2022-0924
CVE-2022-0865
...
CPE    3
cpe:/a:libtiff:libtiff
cpe:/o:redhat:enterprise_linux:7.0
cpe:/o:redhat:enterprise_linux:9

© SecPod Technologies