1 |
type: security |
2 |
subject: Updated libtiff packages fix security vulnerability |
3 |
CVE: |
4 |
- CVE-2022-3599 |
5 |
- CVE-2022-3626 |
6 |
- CVE-2022-3627 |
7 |
src: |
8 |
8: |
9 |
core: |
10 |
- libtiff-4.2.0-1.10.mga8 |
11 |
description: | |
12 |
LibTIFF 4.4.0 has an out-of-bounds read in writeSingleSection in |
13 |
tools/tiffcrop.c:7345, allowing attackers to cause a denial-of-service via |
14 |
a crafted tiff file. (CVE-2022-3599) |
15 |
|
16 |
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in |
17 |
libtiff/tif_unix.c:340 when called from processCropSelections, |
18 |
tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via |
19 |
a crafted tiff file. (CVE-2022-3626) |
20 |
|
21 |
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in |
22 |
libtiff/tif_unix.c:346 when called from extractImageSection, |
23 |
tools/tiffcrop.c:6860, allowing attackers to cause a denial-of-service via |
24 |
a crafted tiff file. (CVE-2022-3627) |
25 |
references: |
26 |
- https://bugs.mageia.org/show_bug.cgi?id=31091 |
27 |
- https://ubuntu.com/security/notices/USN-5714-1 |
28 |
ID: MGASA-2022-0424 |