8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
65.5%
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
almalinux | 9 | i686 | libtiff-devel | < 4.4.0-7.el9 | libtiff-devel-4.4.0-7.el9.i686.rpm |
almalinux | 9 | i686 | libtiff | < 4.4.0-7.el9 | libtiff-4.4.0-7.el9.i686.rpm |
almalinux | 9 | ppc64le | libtiff | < 4.4.0-7.el9 | libtiff-4.4.0-7.el9.ppc64le.rpm |
almalinux | 9 | ppc64le | libtiff-devel | < 4.4.0-7.el9 | libtiff-devel-4.4.0-7.el9.ppc64le.rpm |
almalinux | 9 | x86_64 | libtiff | < 4.4.0-7.el9 | libtiff-4.4.0-7.el9.x86_64.rpm |
almalinux | 9 | x86_64 | libtiff-devel | < 4.4.0-7.el9 | libtiff-devel-4.4.0-7.el9.x86_64.rpm |
almalinux | 9 | aarch64 | libtiff | < 4.4.0-7.el9 | libtiff-4.4.0-7.el9.aarch64.rpm |
almalinux | 9 | aarch64 | libtiff-devel | < 4.4.0-7.el9 | libtiff-devel-4.4.0-7.el9.aarch64.rpm |
almalinux | 9 | s390x | libtiff | < 4.4.0-7.el9 | libtiff-4.4.0-7.el9.s390x.rpm |
almalinux | 9 | s390x | libtiff-devel | < 4.4.0-7.el9 | libtiff-devel-4.4.0-7.el9.s390x.rpm |
access.redhat.com/errata/RHSA-2023:2340
access.redhat.com/security/cve/CVE-2022-3570
access.redhat.com/security/cve/CVE-2022-3597
access.redhat.com/security/cve/CVE-2022-3598
access.redhat.com/security/cve/CVE-2022-3599
access.redhat.com/security/cve/CVE-2022-3626
access.redhat.com/security/cve/CVE-2022-3627
access.redhat.com/security/cve/CVE-2022-3970
access.redhat.com/security/cve/CVE-2022-4645
access.redhat.com/security/cve/CVE-2023-30774
access.redhat.com/security/cve/CVE-2023-30775
bugzilla.redhat.com/2142734
bugzilla.redhat.com/2142736
bugzilla.redhat.com/2142738
bugzilla.redhat.com/2142740
bugzilla.redhat.com/2142741
bugzilla.redhat.com/2142742
bugzilla.redhat.com/2148918
bugzilla.redhat.com/2176220
bugzilla.redhat.com/2187139
bugzilla.redhat.com/2187141
errata.almalinux.org/9/ALSA-2023-2340.html
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
65.5%