{"id":"ALPINE-CVE-2022-2057","details":"Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.","modified":"2025-12-03T22:49:48.384469Z","published":"2022-06-30T16:15:08.357Z","upstream":["CVE-2022-2057"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2022-2057"}],"affected":[{"package":{"name":"tiff","ecosystem":"Alpine:v3.15","purl":"pkg:apk/alpine/tiff?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-r3"}]}],"versions":["3.8.2-r0","3.8.2-r1","3.8.2-r2","3.8.2-r3","3.8.2-r4","3.9.5-r0","3.9.5-r1","4.0.1-r0","4.0.10-r0","4.0.10-r1","4.0.10-r2","4.0.2-r0","4.0.2-r1","4.0.3-r0","4.0.3-r1","4.0.3-r2","4.0.3-r3","4.0.6-r0","4.0.6-r1","4.0.6-r2","4.0.6-r3","4.0.7-r0","4.0.7-r1","4.0.7-r2","4.0.7-r3","4.0.8-r0","4.0.8-r1","4.0.9-r0","4.0.9-r1","4.0.9-r2","4.0.9-r3","4.0.9-r4","4.0.9-r5","4.0.9-r6","4.0.9-r7","4.0.9-r8","4.1.0-r0","4.1.0-r1","4.1.0-r2","4.2.0-r0","4.2.0-r1","4.3.0-r0","4.3.0-r1","4.4.0-r0","4.4.0-r1","4.4.0-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-2057.json"}},{"package":{"name":"tiff","ecosystem":"Alpine:v3.16","purl":"pkg:apk/alpine/tiff?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-r3"}]}],"versions":["3.8.2-r0","3.8.2-r1","3.8.2-r2","3.8.2-r3","3.8.2-r4","3.9.5-r0","3.9.5-r1","4.0.1-r0","4.0.10-r0","4.0.10-r1","4.0.10-r2","4.0.2-r0","4.0.2-r1","4.0.3-r0","4.0.3-r1","4.0.3-r2","4.0.3-r3","4.0.6-r0","4.0.6-r1","4.0.6-r2","4.0.6-r3","4.0.7-r0","4.0.7-r1","4.0.7-r2","4.0.7-r3","4.0.8-r0","4.0.8-r1","4.0.9-r0","4.0.9-r1","4.0.9-r2","4.0.9-r3","4.0.9-r4","4.0.9-r5","4.0.9-r6","4.0.9-r7","4.0.9-r8","4.1.0-r0","4.1.0-r1","4.1.0-r2","4.2.0-r0","4.2.0-r1","4.3.0-r0","4.3.0-r1","4.4.0-r0","4.4.0-r1","4.4.0-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-2057.json"}},{"package":{"name":"tiff","ecosystem":"Alpine:v3.17","purl":"pkg:apk/alpine/tiff?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-r1"}]}],"versions":["3.8.2-r0","3.8.2-r1","3.8.2-r2","3.8.2-r3","3.8.2-r4","3.9.5-r0","3.9.5-r1","4.0.1-r0","4.0.10-r0","4.0.10-r1","4.0.10-r2","4.0.2-r0","4.0.2-r1","4.0.3-r0","4.0.3-r1","4.0.3-r2","4.0.3-r3","4.0.6-r0","4.0.6-r1","4.0.6-r2","4.0.6-r3","4.0.7-r0","4.0.7-r1","4.0.7-r2","4.0.7-r3","4.0.8-r0","4.0.8-r1","4.0.9-r0","4.0.9-r1","4.0.9-r2","4.0.9-r3","4.0.9-r4","4.0.9-r5","4.0.9-r6","4.0.9-r7","4.0.9-r8","4.1.0-r0","4.1.0-r1","4.1.0-r2","4.2.0-r0","4.2.0-r1","4.3.0-r0","4.3.0-r1","4.4.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-2057.json"}},{"package":{"name":"tiff","ecosystem":"Alpine:v3.18","purl":"pkg:apk/alpine/tiff?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-r1"}]}],"versions":["3.8.2-r0","3.8.2-r1","3.8.2-r2","3.8.2-r3","3.8.2-r4","3.9.5-r0","3.9.5-r1","4.0.1-r0","4.0.10-r0","4.0.10-r1","4.0.10-r2","4.0.2-r0","4.0.2-r1","4.0.3-r0","4.0.3-r1","4.0.3-r2","4.0.3-r3","4.0.6-r0","4.0.6-r1","4.0.6-r2","4.0.6-r3","4.0.7-r0","4.0.7-r1","4.0.7-r2","4.0.7-r3","4.0.8-r0","4.0.8-r1","4.0.9-r0","4.0.9-r1","4.0.9-r2","4.0.9-r3","4.0.9-r4","4.0.9-r5","4.0.9-r6","4.0.9-r7","4.0.9-r8","4.1.0-r0","4.1.0-r1","4.1.0-r2","4.2.0-r0","4.2.0-r1","4.3.0-r0","4.3.0-r1","4.4.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-2057.json"}},{"package":{"name":"tiff","ecosystem":"Alpine:v3.19","purl":"pkg:apk/alpine/tiff?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-r1"}]}],"versions":["3.8.2-r0","3.8.2-r1","3.8.2-r2","3.8.2-r3","3.8.2-r4","3.9.5-r0","3.9.5-r1","4.0.1-r0","4.0.10-r0","4.0.10-r1","4.0.10-r2","4.0.2-r0","4.0.2-r1","4.0.3-r0","4.0.3-r1","4.0.3-r2","4.0.3-r3","4.0.6-r0","4.0.6-r1","4.0.6-r2","4.0.6-r3","4.0.7-r0","4.0.7-r1","4.0.7-r2","4.0.7-r3","4.0.8-r0","4.0.8-r1","4.0.9-r0","4.0.9-r1","4.0.9-r2","4.0.9-r3","4.0.9-r4","4.0.9-r5","4.0.9-r6","4.0.9-r7","4.0.9-r8","4.1.0-r0","4.1.0-r1","4.1.0-r2","4.2.0-r0","4.2.0-r1","4.3.0-r0","4.3.0-r1","4.4.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-2057.json"}},{"package":{"name":"tiff","ecosystem":"Alpine:v3.20","purl":"pkg:apk/alpine/tiff?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-r1"}]}],"versions":["3.8.2-r0","3.8.2-r1","3.8.2-r2","3.8.2-r3","3.8.2-r4","3.9.5-r0","3.9.5-r1","4.0.1-r0","4.0.10-r0","4.0.10-r1","4.0.10-r2","4.0.2-r0","4.0.2-r1","4.0.3-r0","4.0.3-r1","4.0.3-r2","4.0.3-r3","4.0.6-r0","4.0.6-r1","4.0.6-r2","4.0.6-r3","4.0.7-r0","4.0.7-r1","4.0.7-r2","4.0.7-r3","4.0.8-r0","4.0.8-r1","4.0.9-r0","4.0.9-r1","4.0.9-r2","4.0.9-r3","4.0.9-r4","4.0.9-r5","4.0.9-r6","4.0.9-r7","4.0.9-r8","4.1.0-r0","4.1.0-r1","4.1.0-r2","4.2.0-r0","4.2.0-r1","4.3.0-r0","4.3.0-r1","4.4.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-2057.json"}},{"package":{"name":"tiff","ecosystem":"Alpine:v3.21","purl":"pkg:apk/alpine/tiff?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-r1"}]}],"versions":["3.8.2-r0","3.8.2-r1","3.8.2-r2","3.8.2-r3","3.8.2-r4","3.9.5-r0","3.9.5-r1","4.0.1-r0","4.0.10-r0","4.0.10-r1","4.0.10-r2","4.0.2-r0","4.0.2-r1","4.0.3-r0","4.0.3-r1","4.0.3-r2","4.0.3-r3","4.0.6-r0","4.0.6-r1","4.0.6-r2","4.0.6-r3","4.0.7-r0","4.0.7-r1","4.0.7-r2","4.0.7-r3","4.0.8-r0","4.0.8-r1","4.0.9-r0","4.0.9-r1","4.0.9-r2","4.0.9-r3","4.0.9-r4","4.0.9-r5","4.0.9-r6","4.0.9-r7","4.0.9-r8","4.1.0-r0","4.1.0-r1","4.1.0-r2","4.2.0-r0","4.2.0-r1","4.3.0-r0","4.3.0-r1","4.4.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-2057.json"}},{"package":{"name":"tiff","ecosystem":"Alpine:v3.22","purl":"pkg:apk/alpine/tiff?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-r1"}]}],"versions":["3.8.2-r0","3.8.2-r1","3.8.2-r2","3.8.2-r3","3.8.2-r4","3.9.5-r0","3.9.5-r1","4.0.1-r0","4.0.10-r0","4.0.10-r1","4.0.10-r2","4.0.2-r0","4.0.2-r1","4.0.3-r0","4.0.3-r1","4.0.3-r2","4.0.3-r3","4.0.6-r0","4.0.6-r1","4.0.6-r2","4.0.6-r3","4.0.7-r0","4.0.7-r1","4.0.7-r2","4.0.7-r3","4.0.8-r0","4.0.8-r1","4.0.9-r0","4.0.9-r1","4.0.9-r2","4.0.9-r3","4.0.9-r4","4.0.9-r5","4.0.9-r6","4.0.9-r7","4.0.9-r8","4.1.0-r0","4.1.0-r1","4.1.0-r2","4.2.0-r0","4.2.0-r1","4.3.0-r0","4.3.0-r1","4.4.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-2057.json"}},{"package":{"name":"tiff","ecosystem":"Alpine:v3.23","purl":"pkg:apk/alpine/tiff?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-r1"}]}],"versions":["3.8.2-r0","3.8.2-r1","3.8.2-r2","3.8.2-r3","3.8.2-r4","3.9.5-r0","3.9.5-r1","4.0.1-r0","4.0.10-r0","4.0.10-r1","4.0.10-r2","4.0.2-r0","4.0.2-r1","4.0.3-r0","4.0.3-r1","4.0.3-r2","4.0.3-r3","4.0.6-r0","4.0.6-r1","4.0.6-r2","4.0.6-r3","4.0.7-r0","4.0.7-r1","4.0.7-r2","4.0.7-r3","4.0.8-r0","4.0.8-r1","4.0.9-r0","4.0.9-r1","4.0.9-r2","4.0.9-r3","4.0.9-r4","4.0.9-r5","4.0.9-r6","4.0.9-r7","4.0.9-r8","4.1.0-r0","4.1.0-r1","4.1.0-r2","4.2.0-r0","4.2.0-r1","4.3.0-r0","4.3.0-r1","4.4.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-2057.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}