{"id":"RLSA-2023:0095","summary":"Moderate: libtiff security update","details":"The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)\n\n* libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519)\n\n* libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867)\n\n* libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869)\n\n* libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953)\n\n* libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520)\n\n* libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521)\n\n* libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-05T11:00:03.770876Z","published":"2023-01-12T08:25:25Z","upstream":["CVE-2022-2056","CVE-2022-2057","CVE-2022-2058","CVE-2022-2519","CVE-2022-2520","CVE-2022-2521","CVE-2022-2867","CVE-2022-2868","CVE-2022-2869","CVE-2022-2953"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2023:0095"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2103222"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2118847"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2118863"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2118869"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122789"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122792"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122799"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134432"}],"affected":[{"package":{"name":"libtiff","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/libtiff?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.0.9-26.el8_7"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2023:0095.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}