Mageia alert MGASA-2022-0240 (libtiff)
| From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
| To: | updates-announce@ml.mageia.org | |
| Subject: | [updates-announce] MGASA-2022-0240: Updated libtiff packages fix security vulnerability | |
| Date: | Fri, 24 Jun 2022 22:51:49 +0200 | |
| Message-ID: | <20220624205149.D27D79FEA2@duvel.mageia.org> | |
| Archive-link: | Article |
MGASA-2022-0240 - Updated libtiff packages fix security vulnerability Publication date: 24 Jun 2022 URL: https://advisories.mageia.org/MGASA-2022-0240.html Type: security Affected Mageia releases: 8 CVE: CVE-2022-1354, CVE-2022-1355, CVE-2022-1622, CVE-2022-1623 Description: Heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c. (CVE-2022-1354) Stack-buffer-overflow in tiffcp.c in main(). (CVE-2022-1355) Out-of-bounds read in LZWDecode. (CVE-2022-1622, CVE-2022-1623) References: - https://bugs.mageia.org/show_bug.cgi?id=30571 - https://lists.fedoraproject.org/archives/list/package-ann... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1355 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1622 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1623 SRPMS: - 8/core/libtiff-4.2.0-1.5.mga8
