{"id":"USN-5523-2","summary":"tiff vulnerabilities","details":"USN-5523-1 fixed several vulnerabilities in LibTIFF. This update\nprovides the fixes for CVE-2022-0907, CVE-2022-0908, CVE-2022-0909,\nCVE-2022-0924 and CVE-2022-22844 for Ubuntu 18.04 LTS and\nUbuntu 20.04 LTS.\n\nOriginal advisory details:\n\n It was discovered that LibTIFF was not properly perf   orming checks to\n guarantee that allocated memory space existed, which could lead to a\n NULL pointer dereference via a specially crafted file. An attacker\n could possibly use this issue to cause a denial of service.\n (CVE-2022-0907, CVE-2022-0908)\n \n It was discovered that LibTIFF was not properly performing checks to\n avoid division calculations where the denominator value was zero,\n which could lead to an undefined behavior situation via a specially\n crafted file. An attacker could possibly use this issue to cause a\n denial of service. (CVE-2022-0909)\n \n It was discovered that LibTIFF was not properly performing bounds\n checks, which could lead to an out-of-bounds read via a specially\n crafted file. An attacker could possibly use this issue to cause a\n denial of service or to expose sensitive information. (CVE-2022-0924)\n \n It was discovered that LibTIFF was not properly performing the\n calculation of data that would eventually be used as a reference for\n bounds checking operations, which could lead to an out-of-bounds\n read via a specially crafted file. An attacker could possibly use\n this issue to cause a denial of service or to expose sensitive\n information. (CVE-2020-19131)\n \n It was discovered that LibTIFF was not properly terminating a\n function execution when processing incorrect data, which could lead\n to an out-of-bounds read via a specially crafted file. An attacker\n could possibly use this issue to cause a denial of service or to\n expose sensitive information. (CVE-2020-19144)\n \n It was discovered that LibTIFF was not properly performing checks\n when setting the value for data later used as reference during memory\n access, which could lead to an out-of-bounds read via a specially\n crafted file. An attacker could possibly use this issue to cause a\n denial of service or to expose sensitive information.\n (CVE-2022-22844)\n","modified":"2026-02-10T04:42:42Z","published":"2022-09-12T07:49:59Z","related":["UBUNTU-CVE-2022-0907","UBUNTU-CVE-2022-0908","UBUNTU-CVE-2022-0909","UBUNTU-CVE-2022-0924","UBUNTU-CVE-2022-22844"],"upstream":["CVE-2022-0907","CVE-2022-0908","CVE-2022-0909","CVE-2022-0924","CVE-2022-22844","UBUNTU-CVE-2022-0907","UBUNTU-CVE-2022-0908","UBUNTU-CVE-2022-0909","UBUNTU-CVE-2022-0924","UBUNTU-CVE-2022-22844"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5523-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-0907"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-0908"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-0909"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-0924"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-22844"}],"affected":[{"package":{"name":"tiff","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/tiff@4.0.9-5ubuntu0.6?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.9-5ubuntu0.6"}]}],"versions":["4.0.8-5","4.0.8-6","4.0.9-1","4.0.9-2","4.0.9-3","4.0.9-4","4.0.9-4ubuntu1","4.0.9-5","4.0.9-5ubuntu0.1","4.0.9-5ubuntu0.2","4.0.9-5ubuntu0.3","4.0.9-5ubuntu0.4","4.0.9-5ubuntu0.5"],"ecosystem_specific":{"binaries":[{"binary_version":"4.0.9-5ubuntu0.6","binary_name":"libtiff-dev"},{"binary_version":"4.0.9-5ubuntu0.6","binary_name":"libtiff-opengl"},{"binary_version":"4.0.9-5ubuntu0.6","binary_name":"libtiff-tools"},{"binary_version":"4.0.9-5ubuntu0.6","binary_name":"libtiff5"},{"binary_version":"4.0.9-5ubuntu0.6","binary_name":"libtiff5-dev"},{"binary_version":"4.0.9-5ubuntu0.6","binary_name":"libtiffxx5"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5523-2.json","cves_map":{"cves":[{"id":"CVE-2022-0907","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-0908","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-0909","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-0924","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-22844","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}]}],"ecosystem":"Ubuntu:18.04:LTS"}}},{"package":{"name":"tiff","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/tiff@4.1.0+git191117-2ubuntu0.20.04.4?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.1.0+git191117-2ubuntu0.20.04.4"}]}],"versions":["4.0.10+git191003-1","4.1.0+git191117-1","4.1.0+git191117-2","4.1.0+git191117-2build1","4.1.0+git191117-2ubuntu0.20.04.1","4.1.0+git191117-2ubuntu0.20.04.2","4.1.0+git191117-2ubuntu0.20.04.3"],"ecosystem_specific":{"binaries":[{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.4","binary_name":"libtiff-dev"},{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.4","binary_name":"libtiff-opengl"},{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.4","binary_name":"libtiff-tools"},{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.4","binary_name":"libtiff5"},{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.4","binary_name":"libtiff5-dev"},{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.4","binary_name":"libtiffxx5"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5523-2.json","cves_map":{"cves":[{"id":"CVE-2022-0907","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-0908","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-0909","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-0924","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-22844","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}]}],"ecosystem":"Ubuntu:20.04:LTS"}}}],"schema_version":"1.7.3"}