|
|
Subscribe / Log in / New account

Mageia alert MGASA-2022-0424 (libtiff)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2022-0424: Updated libtiff packages fix security vulnerability
Date:  Sun, 13 Nov 2022 03:26:36 +0100
Message-ID:  <20221113022636.EB5349FCCB@duvel.mageia.org>
Archive-link:  Article

MGASA-2022-0424 - Updated libtiff packages fix security vulnerability Publication date: 13 Nov 2022 URL: https://advisories.mageia.org/MGASA-2022-0424.html Type: security Affected Mageia releases: 8 CVE: CVE-2022-3599, CVE-2022-3626, CVE-2022-3627 Description: LibTIFF 4.4.0 has an out-of-bounds read in writeSingleSection in tools/tiffcrop.c:7345, allowing attackers to cause a denial-of-service via a crafted tiff file. (CVE-2022-3599) LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c:340 when called from processCropSelections, tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via a crafted tiff file. (CVE-2022-3626) LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6860, allowing attackers to cause a denial-of-service via a crafted tiff file. (CVE-2022-3627) References: - https://bugs.mageia.org/show_bug.cgi?id=31091 - https://ubuntu.com/security/notices/USN-5714-1 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3599 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3626 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3627 SRPMS: - 8/core/libtiff-4.2.0-1.10.mga8


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds