7.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:N/A:P
0.006 Low
EPSS
Percentile
78.6%
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
libtiff: reachable assertion (CVE-2022-0865)
libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 8 | x86_64 | libtiff-tools | < 4.0.9-23.el8 | libtiff-tools-4.0.9-23.el8.x86_64.rpm |
RedHat | 8 | aarch64 | libtiff-tools | < 4.0.9-23.el8 | libtiff-tools-4.0.9-23.el8.aarch64.rpm |
RedHat | 8 | x86_64 | libtiff-tools-debuginfo | < 4.0.9-23.el8 | libtiff-tools-debuginfo-4.0.9-23.el8.x86_64.rpm |
RedHat | 8 | i686 | libtiff | < 4.0.9-23.el8 | libtiff-4.0.9-23.el8.i686.rpm |
RedHat | 8 | ppc64le | libtiff-debugsource | < 4.0.9-23.el8 | libtiff-debugsource-4.0.9-23.el8.ppc64le.rpm |
RedHat | 8 | i686 | libtiff-debuginfo | < 4.0.9-23.el8 | libtiff-debuginfo-4.0.9-23.el8.i686.rpm |
RedHat | 8 | x86_64 | libtiff | < 4.0.9-23.el8 | libtiff-4.0.9-23.el8.x86_64.rpm |
RedHat | 8 | x86_64 | libtiff-debugsource | < 4.0.9-23.el8 | libtiff-debugsource-4.0.9-23.el8.x86_64.rpm |
RedHat | 8 | x86_64 | libtiff-debuginfo | < 4.0.9-23.el8 | libtiff-debuginfo-4.0.9-23.el8.x86_64.rpm |
RedHat | 8 | aarch64 | libtiff-debuginfo | < 4.0.9-23.el8 | libtiff-debuginfo-4.0.9-23.el8.aarch64.rpm |
7.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:N/A:P
0.006 Low
EPSS
Percentile
78.6%