{"id":"USN-5743-2","summary":"tiff vulnerability","details":"USN-5743-1 fixed a vulnerability in LibTIFF. This update provides the\ncorresponding updates for Ubuntu 18.04 LTS, Ubuntu 20.04 LTS,\nUbuntu 22.04 LTS and Ubuntu 22.10.\n\nOriginal advisory details:\n\n It was discovered that LibTIFF incorrectly handled certain malformed\n images. If a user or automated system were tricked into opening a specially\n crafted image, a remote attacker could crash the application, leading to a\n denial of service, or possibly execute arbitrary code with user privileges.\n","modified":"2026-02-10T04:42:51Z","published":"2022-12-01T16:21:13Z","related":["UBUNTU-CVE-2022-3970"],"upstream":["CVE-2022-3970","UBUNTU-CVE-2022-3970"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5743-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3970"}],"affected":[{"package":{"name":"tiff","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/tiff@4.0.9-5ubuntu0.9?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.9-5ubuntu0.9"}]}],"versions":["4.0.8-5","4.0.8-6","4.0.9-1","4.0.9-2","4.0.9-3","4.0.9-4","4.0.9-4ubuntu1","4.0.9-5","4.0.9-5ubuntu0.1","4.0.9-5ubuntu0.2","4.0.9-5ubuntu0.3","4.0.9-5ubuntu0.4","4.0.9-5ubuntu0.5","4.0.9-5ubuntu0.6","4.0.9-5ubuntu0.7","4.0.9-5ubuntu0.8"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.0.9-5ubuntu0.9","binary_name":"libtiff-dev"},{"binary_version":"4.0.9-5ubuntu0.9","binary_name":"libtiff-opengl"},{"binary_version":"4.0.9-5ubuntu0.9","binary_name":"libtiff-tools"},{"binary_version":"4.0.9-5ubuntu0.9","binary_name":"libtiff5"},{"binary_version":"4.0.9-5ubuntu0.9","binary_name":"libtiff5-dev"},{"binary_version":"4.0.9-5ubuntu0.9","binary_name":"libtiffxx5"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-3970"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5743-2.json"}},{"package":{"name":"tiff","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/tiff@4.1.0+git191117-2ubuntu0.20.04.7?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.1.0+git191117-2ubuntu0.20.04.7"}]}],"versions":["4.0.10+git191003-1","4.1.0+git191117-1","4.1.0+git191117-2","4.1.0+git191117-2build1","4.1.0+git191117-2ubuntu0.20.04.1","4.1.0+git191117-2ubuntu0.20.04.2","4.1.0+git191117-2ubuntu0.20.04.3","4.1.0+git191117-2ubuntu0.20.04.4","4.1.0+git191117-2ubuntu0.20.04.5","4.1.0+git191117-2ubuntu0.20.04.6"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.7","binary_name":"libtiff-dev"},{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.7","binary_name":"libtiff-opengl"},{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.7","binary_name":"libtiff-tools"},{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.7","binary_name":"libtiff5"},{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.7","binary_name":"libtiff5-dev"},{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.7","binary_name":"libtiffxx5"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-3970"}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5743-2.json"}},{"package":{"name":"tiff","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/tiff@4.3.0-6ubuntu0.3?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.3.0-6ubuntu0.3"}]}],"versions":["4.3.0-1","4.3.0-2","4.3.0-3","4.3.0-3build1","4.3.0-4","4.3.0-5","4.3.0-6","4.3.0-6ubuntu0.1","4.3.0-6ubuntu0.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.3.0-6ubuntu0.3","binary_name":"libtiff-dev"},{"binary_version":"4.3.0-6ubuntu0.3","binary_name":"libtiff-opengl"},{"binary_version":"4.3.0-6ubuntu0.3","binary_name":"libtiff-tools"},{"binary_version":"4.3.0-6ubuntu0.3","binary_name":"libtiff5"},{"binary_version":"4.3.0-6ubuntu0.3","binary_name":"libtiff5-dev"},{"binary_version":"4.3.0-6ubuntu0.3","binary_name":"libtiffxx5"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-3970"}],"ecosystem":"Ubuntu:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5743-2.json"}}],"schema_version":"1.7.3"}