libtiff-4.0.9-23.el8

エラータID: AXSA:2022-4143:03

Release date: 
Friday, November 25, 2022 - 07:45
Subject: 
libtiff-4.0.9-23.el8
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.

Security Fix(es):

* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
* libtiff: reachable assertion (CVE-2022-0865)
* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Asianux Server 8.7 Release Notes linked from the References section.

CVE-2022-0561
Null source pointer passed as an argument to memcpy() function within TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, the fix is available with commit eecb0712.
CVE-2022-0562
Null source pointer passed as an argument to memcpy() function within TIFFReadDirectory() in tif_dirread.c in libtiff versions from 4.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, a fix is available with commit 561599c.
CVE-2022-0865
Reachable Assertion in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 5e180045.
CVE-2022-0891
A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact
CVE-2022-0908
Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.
CVE-2022-0909
Divide By Zero error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f8d0f9aa.
CVE-2022-0924
Out-of-bounds Read error in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 408976c4.
CVE-2022-1355
A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.
CVE-2022-22844
LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. libtiff-4.0.9-23.el8.src.rpm
    MD5: f1363486021720e821bc23cd7c3a3cb3
    SHA-256: bc30cc350b1a7811d43c0658451a1e56c0d739e23a568928f2bd5206ad64a5f0
    Size: 2.26 MB

Asianux Server 8 for x86_64
  1. libtiff-4.0.9-23.el8.x86_64.rpm
    MD5: f78f3f195adac4f0024a07df95f6bf0c
    SHA-256: 0d7c9915f8696c27847b803eb9dd2ebee0ae1d15cc6e63caccfe3c9a0fbad3bc
    Size: 187.41 kB
  2. libtiff-devel-4.0.9-23.el8.x86_64.rpm
    MD5: 04a186f0e0ad6b9ef9ace0ccba5685f3
    SHA-256: 3a5bf1b33bc3d90a6f33fbbe5bc08688346b9d302d245da835117a2ec13ac33a
    Size: 510.49 kB
  3. libtiff-tools-4.0.9-23.el8.x86_64.rpm
    MD5: 21c1a97d68bea131b2e3cf903edd9013
    SHA-256: c37903bd7d4c81216e910a35781ee100b837e6443ef6d154babaca7bd8e2d80e
    Size: 252.62 kB
  4. libtiff-4.0.9-23.el8.i686.rpm
    MD5: 008690fbcfe72b3f626bf2b61e22928b
    SHA-256: 68e594591c87c1d9951e31aa8898b84a3f8f4b8efc0684ccdb95e3552d5f3e77
    Size: 201.90 kB
  5. libtiff-devel-4.0.9-23.el8.i686.rpm
    MD5: 15b746937096427640f5aa78ae9ae917
    SHA-256: e2b26cd97a5899c1ccf678e8fdb0f7dc374fad68d551f115fa4f98529489f7e0
    Size: 510.50 kB