5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
20.5%
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
almalinux | 9 | i686 | libtiff | < 4.4.0-8.el9_2 | libtiff-4.4.0-8.el9_2.i686.rpm |
almalinux | 9 | i686 | libtiff-devel | < 4.4.0-8.el9_2 | libtiff-devel-4.4.0-8.el9_2.i686.rpm |
almalinux | 9 | aarch64 | libtiff | < 4.4.0-8.el9_2 | libtiff-4.4.0-8.el9_2.aarch64.rpm |
almalinux | 9 | aarch64 | libtiff-devel | < 4.4.0-8.el9_2 | libtiff-devel-4.4.0-8.el9_2.aarch64.rpm |
almalinux | 9 | x86_64 | libtiff-devel | < 4.4.0-8.el9_2 | libtiff-devel-4.4.0-8.el9_2.x86_64.rpm |
almalinux | 9 | x86_64 | libtiff | < 4.4.0-8.el9_2 | libtiff-4.4.0-8.el9_2.x86_64.rpm |
almalinux | 9 | s390x | libtiff-devel | < 4.4.0-8.el9_2 | libtiff-devel-4.4.0-8.el9_2.s390x.rpm |
almalinux | 9 | s390x | libtiff | < 4.4.0-8.el9_2 | libtiff-4.4.0-8.el9_2.s390x.rpm |
almalinux | 9 | ppc64le | libtiff | < 4.4.0-8.el9_2 | libtiff-4.4.0-8.el9_2.ppc64le.rpm |
almalinux | 9 | ppc64le | libtiff-devel | < 4.4.0-8.el9_2 | libtiff-devel-4.4.0-8.el9_2.ppc64le.rpm |
access.redhat.com/errata/RHSA-2023:3711
access.redhat.com/security/cve/CVE-2022-48281
access.redhat.com/security/cve/CVE-2023-0795
access.redhat.com/security/cve/CVE-2023-0796
access.redhat.com/security/cve/CVE-2023-0797
access.redhat.com/security/cve/CVE-2023-0798
access.redhat.com/security/cve/CVE-2023-0799
access.redhat.com/security/cve/CVE-2023-0800
access.redhat.com/security/cve/CVE-2023-0801
access.redhat.com/security/cve/CVE-2023-0802
access.redhat.com/security/cve/CVE-2023-0803
access.redhat.com/security/cve/CVE-2023-0804
bugzilla.redhat.com/2163606
bugzilla.redhat.com/2170119
bugzilla.redhat.com/2170146
bugzilla.redhat.com/2170151
bugzilla.redhat.com/2170157
bugzilla.redhat.com/2170162
bugzilla.redhat.com/2170167
bugzilla.redhat.com/2170172
bugzilla.redhat.com/2170178
bugzilla.redhat.com/2170187
bugzilla.redhat.com/2170192
errata.almalinux.org/9/ALSA-2023-3711.html
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
20.5%