{"id":"ALSA-2023:0095","summary":"Moderate: libtiff security update","details":"The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)\n* libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519)\n* libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867)\n* libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869)\n* libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953)\n* libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520)\n* libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521)\n* libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-04T03:19:18.789447Z","published":"2023-01-12T00:00:00Z","related":["CVE-2022-2056","CVE-2022-2057","CVE-2022-2058","CVE-2022-2519","CVE-2022-2520","CVE-2022-2521","CVE-2022-2867","CVE-2022-2868","CVE-2022-2869","CVE-2022-2953"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:0095"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2056"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2057"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2058"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2519"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2520"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2521"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2867"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2868"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2869"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2953"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2103222"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2118847"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2118863"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2118869"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2122789"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2122792"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2122799"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2134432"},{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2023-0095.html"}],"affected":[{"package":{"name":"libtiff","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/libtiff"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.9-26.el8_7"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2023:0095.json"}},{"package":{"name":"libtiff-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/libtiff-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.9-26.el8_7"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2023:0095.json"}},{"package":{"name":"libtiff-tools","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/libtiff-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.9-26.el8_7"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2023:0095.json"}}],"schema_version":"1.7.3"}