{"id":"ALSA-2023:3711","summary":"Moderate: libtiff security update","details":"The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c (CVE-2022-48281)\n* libtiff: out-of-bounds read in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0795)\n* libtiff: out-of-bounds read in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0796)\n* libtiff: out-of-bounds read in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0797)\n* libtiff: out-of-bounds read in extractContigSamplesShifted8bits() in tools/tiffcrop.c (CVE-2023-0798)\n* libtiff: use-after-free in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0799)\n* libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0800)\n* libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0801)\n* libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0802)\n* libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0803)\n* libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-04T03:04:29.246090Z","published":"2023-06-21T00:00:00Z","related":["CVE-2022-48281","CVE-2023-0795","CVE-2023-0796","CVE-2023-0797","CVE-2023-0798","CVE-2023-0799","CVE-2023-0800","CVE-2023-0801","CVE-2023-0802","CVE-2023-0803","CVE-2023-0804"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:3711"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48281"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0795"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0796"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0797"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0798"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0799"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0800"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0801"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0802"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0803"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0804"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2163606"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170119"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170146"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170151"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170157"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170162"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170167"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170172"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170187"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170192"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2023-3711.html"}],"affected":[{"package":{"name":"libtiff","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/libtiff"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-8.el9_2"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2023:3711.json"}},{"package":{"name":"libtiff-devel","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/libtiff-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-8.el9_2"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2023:3711.json"}},{"package":{"name":"libtiff-tools","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/libtiff-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-8.el9_2"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2023:3711.json"}}],"schema_version":"1.7.3"}