6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.003 Low
EPSS
Percentile
67.5%
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
almalinux | 8 | i686 | libtiff-devel | < 4.0.9-26.el8_7 | libtiff-devel-4.0.9-26.el8_7.i686.rpm |
almalinux | 8 | i686 | libtiff | < 4.0.9-26.el8_7 | libtiff-4.0.9-26.el8_7.i686.rpm |
almalinux | 8 | x86_64 | libtiff-tools | < 4.0.9-26.el8_7 | libtiff-tools-4.0.9-26.el8_7.x86_64.rpm |
almalinux | 8 | aarch64 | libtiff-tools | < 4.0.9-26.el8_7 | libtiff-tools-4.0.9-26.el8_7.aarch64.rpm |
almalinux | 8 | x86_64 | libtiff | < 4.0.9-26.el8_7 | libtiff-4.0.9-26.el8_7.x86_64.rpm |
almalinux | 8 | x86_64 | libtiff-devel | < 4.0.9-26.el8_7 | libtiff-devel-4.0.9-26.el8_7.x86_64.rpm |
almalinux | 8 | aarch64 | libtiff | < 4.0.9-26.el8_7 | libtiff-4.0.9-26.el8_7.aarch64.rpm |
almalinux | 8 | aarch64 | libtiff-devel | < 4.0.9-26.el8_7 | libtiff-devel-4.0.9-26.el8_7.aarch64.rpm |
almalinux | 8 | ppc64le | libtiff-tools | < 4.0.9-26.el8_7 | libtiff-tools-4.0.9-26.el8_7.ppc64le.rpm |
almalinux | 8 | ppc64le | libtiff | < 4.0.9-26.el8_7 | libtiff-4.0.9-26.el8_7.ppc64le.rpm |
access.redhat.com/errata/RHSA-2023:0095
access.redhat.com/security/cve/CVE-2022-2056
access.redhat.com/security/cve/CVE-2022-2057
access.redhat.com/security/cve/CVE-2022-2058
access.redhat.com/security/cve/CVE-2022-2519
access.redhat.com/security/cve/CVE-2022-2520
access.redhat.com/security/cve/CVE-2022-2521
access.redhat.com/security/cve/CVE-2022-2867
access.redhat.com/security/cve/CVE-2022-2868
access.redhat.com/security/cve/CVE-2022-2869
access.redhat.com/security/cve/CVE-2022-2953
bugzilla.redhat.com/2103222
bugzilla.redhat.com/2118847
bugzilla.redhat.com/2118863
bugzilla.redhat.com/2118869
bugzilla.redhat.com/2122789
bugzilla.redhat.com/2122792
bugzilla.redhat.com/2122799
bugzilla.redhat.com/2134432
errata.almalinux.org/8/ALSA-2023-0095.html
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.003 Low
EPSS
Percentile
67.5%