libtiff-4.4.0-7.el9

エラータID: AXSA:2023-5351:03

Release date: 
Tuesday, May 16, 2023 - 01:28
Subject: 
libtiff-4.4.0-7.el9
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.

Security Fix(es):

* libtiff: heap Buffer overflows in tiffcrop.c (CVE-2022-3570)
* libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix (CVE-2022-3597)
* libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c (CVE-2022-3598)
* libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c (CVE-2022-3599)
* libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c (CVE-2022-3626)
* libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (CVE-2022-3627)
* libtiff: integer overflow in function TIFFReadRGBATileExt of the file (CVE-2022-3970)
* libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c (CVE-2022-4645)
* libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value (CVE-2023-30774)
* libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c (CVE-2023-30775)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the MIRACLE LINUX 9.2 Release Notes linked from the References section.

CVE-2022-3570
Multiple heap buffer overflows in tiffcrop.c utility in libtiff library Version 4.4.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact
CVE-2022-3597
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6826, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
CVE-2022-3598
LibTIFF 4.4.0 has an out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c:3604, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit cfbb883b.
CVE-2022-3599
LibTIFF 4.4.0 has an out-of-bounds read in writeSingleSection in tools/tiffcrop.c:7345, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
CVE-2022-3626
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c:340 when called from processCropSelections, tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
CVE-2022-3627
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6860, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
CVE-2022-3970
A vulnerability was found in LibTIFF. It has been classified as critical. This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getimage.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 227500897dfb07fb7d27f7aa570050e62617e3be. It is recommended to apply a patch to fix this issue. The identifier VDB-213549 was assigned to this vulnerability.
CVE-2022-4645
LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
CVE-2023-30774
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2023-30775
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. libtiff-4.4.0-7.el9.src.rpm
    MD5: be4af3f1310653d330489c3995e7e70c
    SHA-256: e5d7048437e0bf740dfd20cb89139d9b629e39844c6daa3ca7edb506260f7857
    Size: 2.74 MB

Asianux Server 9 for x86_64
  1. libtiff-4.4.0-7.el9.i686.rpm
    MD5: 91a0af2b1452d78fccf4add53b1f15f9
    SHA-256: 6b6b53170017d0881ff3d7975dfb4bc56d1cd31cd7500cbf26008c5a51c01750
    Size: 212.83 kB
  2. libtiff-4.4.0-7.el9.x86_64.rpm
    MD5: 6813b806be2ef69067f8492319c6d228
    SHA-256: 4cad15ce1961d4cce234ea1fdc4e2ab7c23edefbfb10044fa1cc980699727714
    Size: 195.38 kB
  3. libtiff-devel-4.4.0-7.el9.i686.rpm
    MD5: 7d61cfc0706b80e21a2f212c442d23a4
    SHA-256: 1e9af0c8b4a28078a159bd020c254b298072a9fed759f54ddc7e8f5ca10946ca
    Size: 513.18 kB
  4. libtiff-devel-4.4.0-7.el9.x86_64.rpm
    MD5: 864aa4aea7613ae4185d6ba6561d2ddf
    SHA-256: 543d6840c007212fa82b57230765819b4276708ff4392c5312cb433fc31ac000
    Size: 513.21 kB
  5. libtiff-tools-4.4.0-7.el9.x86_64.rpm
    MD5: 920bb31f37a8df1e666714c41b2f9912
    SHA-256: 772ea197d5cf3362b77f34b37c866ff33f907def49099c59d76a80f84b6ce331
    Size: 235.70 kB