{"id":"USN-6290-1","summary":"tiff vulnerabilities","details":"It was discovered that LibTIFF could be made to write out of bounds when\nprocessing certain malformed image files with the tiffcrop utility. If a\nuser were tricked into opening a specially crafted image file, an attacker\ncould possibly use this issue to cause tiffcrop to crash, resulting in a\ndenial of service, or possibly execute arbitrary code. This issue only\naffected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.\n(CVE-2022-48281)\n\nIt was discovered that LibTIFF incorrectly handled certain image files. If\na user were tricked into opening a specially crafted image file, an\nattacker could possibly use this issue to cause a denial of service. This\nissue only affected Ubuntu 23.04. (CVE-2023-2731)\n\nIt was discovered that LibTIFF incorrectly handled certain image files\nwith the tiffcp utility. If a user were tricked into opening a specially\ncrafted image file, an attacker could possibly use this issue to cause\ntiffcp to crash, resulting in a denial of service. (CVE-2023-2908)\n\nIt was discovered that LibTIFF incorrectly handled certain file paths. If\na user were tricked into specifying certain output paths, an attacker\ncould possibly use this issue to cause a denial of service. This issue\nonly affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-3316)\n\nIt was discovered that LibTIFF could be made to write out of bounds when\nprocessing certain malformed image files. If a user were tricked into\nopening a specially crafted image file, an attacker could possibly use\nthis issue to cause a denial of service, or possibly execute arbitrary\ncode. (CVE-2023-3618)\n\nIt was discovered that LibTIFF could be made to write out of bounds when\nprocessing certain malformed image files. If a user were tricked into\nopening a specially crafted image file, an attacker could possibly use\nthis issue to cause a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and\nUbuntu 23.04. (CVE-2023-25433, CVE-2023-26966)\n\nIt was discovered that LibTIFF did not properly managed memory when\nprocessing certain malformed image files with the tiffcrop utility. If a\nuser were tricked into opening a specially crafted image file, an attacker\ncould possibly use this issue to cause tiffcrop to crash, resulting in a\ndenial of service, or possibly execute arbitrary code. This issue only\naffected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04.\n(CVE-2023-26965)\n\nIt was discovered that LibTIFF contained an arithmetic overflow. If a user\nwere tricked into opening a specially crafted image file, an attacker\ncould possibly use this issue to cause a denial of service.\n(CVE-2023-38288, CVE-2023-38289)\n","modified":"2026-02-10T04:43:16Z","published":"2023-08-15T21:02:25Z","related":["UBUNTU-CVE-2022-48281","UBUNTU-CVE-2023-25433","UBUNTU-CVE-2023-26965","UBUNTU-CVE-2023-26966","UBUNTU-CVE-2023-2908","UBUNTU-CVE-2023-3316","UBUNTU-CVE-2023-3618","UBUNTU-CVE-2023-38288","UBUNTU-CVE-2023-38289"],"upstream":["CVE-2022-48281","CVE-2023-25433","CVE-2023-26965","CVE-2023-26966","CVE-2023-2731","CVE-2023-2908","CVE-2023-3316","CVE-2023-3618","CVE-2023-38288","CVE-2023-38289","UBUNTU-CVE-2022-48281","UBUNTU-CVE-2023-25433","UBUNTU-CVE-2023-26965","UBUNTU-CVE-2023-26966","UBUNTU-CVE-2023-2731","UBUNTU-CVE-2023-2908","UBUNTU-CVE-2023-3316","UBUNTU-CVE-2023-3618","UBUNTU-CVE-2023-38288","UBUNTU-CVE-2023-38289"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6290-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-48281"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-2731"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-2908"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3316"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3618"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-25433"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-26965"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-26966"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-38288"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-38289"}],"affected":[{"package":{"name":"tiff","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/tiff@4.0.3-7ubuntu0.11+esm9?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.3-7ubuntu0.11+esm9"}]}],"versions":["4.0.2-4ubuntu3","4.0.3-5ubuntu1","4.0.3-6","4.0.3-6ubuntu1","4.0.3-7","4.0.3-7ubuntu0.1","4.0.3-7ubuntu0.2","4.0.3-7ubuntu0.3","4.0.3-7ubuntu0.4","4.0.3-7ubuntu0.6","4.0.3-7ubuntu0.7","4.0.3-7ubuntu0.8","4.0.3-7ubuntu0.9","4.0.3-7ubuntu0.10","4.0.3-7ubuntu0.11","4.0.3-7ubuntu0.11+esm1","4.0.3-7ubuntu0.11+esm2","4.0.3-7ubuntu0.11+esm3","4.0.3-7ubuntu0.11+esm4","4.0.3-7ubuntu0.11+esm5","4.0.3-7ubuntu0.11+esm6","4.0.3-7ubuntu0.11+esm7","4.0.3-7ubuntu0.11+esm8"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"4.0.3-7ubuntu0.11+esm9","binary_name":"libtiff-opengl"},{"binary_version":"4.0.3-7ubuntu0.11+esm9","binary_name":"libtiff-tools"},{"binary_version":"4.0.3-7ubuntu0.11+esm9","binary_name":"libtiff4-dev"},{"binary_version":"4.0.3-7ubuntu0.11+esm9","binary_name":"libtiff5"},{"binary_version":"4.0.3-7ubuntu0.11+esm9","binary_name":"libtiff5-alt-dev"},{"binary_version":"4.0.3-7ubuntu0.11+esm9","binary_name":"libtiff5-dev"},{"binary_version":"4.0.3-7ubuntu0.11+esm9","binary_name":"libtiffxx5"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"id":"CVE-2023-2908","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-3618","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-38288","severity":[{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-38289","severity":[{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6290-1.json"}},{"package":{"name":"tiff","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/tiff@4.0.6-1ubuntu0.8+esm12?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.6-1ubuntu0.8+esm12"}]}],"versions":["4.0.3-12.3ubuntu2","4.0.5-1","4.0.6-1","4.0.6-1ubuntu0.1","4.0.6-1ubuntu0.2","4.0.6-1ubuntu0.3","4.0.6-1ubuntu0.4","4.0.6-1ubuntu0.5","4.0.6-1ubuntu0.6","4.0.6-1ubuntu0.7","4.0.6-1ubuntu0.8","4.0.6-1ubuntu0.8+esm1","4.0.6-1ubuntu0.8+esm2","4.0.6-1ubuntu0.8+esm3","4.0.6-1ubuntu0.8+esm4","4.0.6-1ubuntu0.8+esm6","4.0.6-1ubuntu0.8+esm7","4.0.6-1ubuntu0.8+esm8","4.0.6-1ubuntu0.8+esm9","4.0.6-1ubuntu0.8+esm10","4.0.6-1ubuntu0.8+esm11"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"4.0.6-1ubuntu0.8+esm12","binary_name":"libtiff-opengl"},{"binary_version":"4.0.6-1ubuntu0.8+esm12","binary_name":"libtiff-tools"},{"binary_version":"4.0.6-1ubuntu0.8+esm12","binary_name":"libtiff5"},{"binary_version":"4.0.6-1ubuntu0.8+esm12","binary_name":"libtiff5-dev"},{"binary_version":"4.0.6-1ubuntu0.8+esm12","binary_name":"libtiffxx5"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"id":"CVE-2023-2908","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-3618","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-38288","severity":[{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-38289","severity":[{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6290-1.json"}},{"package":{"name":"tiff","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/tiff@4.0.9-5ubuntu0.10+esm2?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.9-5ubuntu0.10+esm2"}]}],"versions":["4.0.8-5","4.0.8-6","4.0.9-1","4.0.9-2","4.0.9-3","4.0.9-4","4.0.9-4ubuntu1","4.0.9-5","4.0.9-5ubuntu0.1","4.0.9-5ubuntu0.2","4.0.9-5ubuntu0.3","4.0.9-5ubuntu0.4","4.0.9-5ubuntu0.5","4.0.9-5ubuntu0.6","4.0.9-5ubuntu0.7","4.0.9-5ubuntu0.8","4.0.9-5ubuntu0.9","4.0.9-5ubuntu0.10","4.0.9-5ubuntu0.10+esm1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"4.0.9-5ubuntu0.10+esm2","binary_name":"libtiff-dev"},{"binary_version":"4.0.9-5ubuntu0.10+esm2","binary_name":"libtiff-opengl"},{"binary_version":"4.0.9-5ubuntu0.10+esm2","binary_name":"libtiff-tools"},{"binary_version":"4.0.9-5ubuntu0.10+esm2","binary_name":"libtiff5"},{"binary_version":"4.0.9-5ubuntu0.10+esm2","binary_name":"libtiff5-dev"},{"binary_version":"4.0.9-5ubuntu0.10+esm2","binary_name":"libtiffxx5"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"id":"CVE-2022-48281","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-2908","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-3618","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-38288","severity":[{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-38289","severity":[{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6290-1.json"}},{"package":{"name":"tiff","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/tiff@4.1.0+git191117-2ubuntu0.20.04.9?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.1.0+git191117-2ubuntu0.20.04.9"}]}],"versions":["4.0.10+git191003-1","4.1.0+git191117-1","4.1.0+git191117-2","4.1.0+git191117-2build1","4.1.0+git191117-2ubuntu0.20.04.1","4.1.0+git191117-2ubuntu0.20.04.2","4.1.0+git191117-2ubuntu0.20.04.3","4.1.0+git191117-2ubuntu0.20.04.4","4.1.0+git191117-2ubuntu0.20.04.5","4.1.0+git191117-2ubuntu0.20.04.6","4.1.0+git191117-2ubuntu0.20.04.7","4.1.0+git191117-2ubuntu0.20.04.8"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.9","binary_name":"libtiff-dev"},{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.9","binary_name":"libtiff-opengl"},{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.9","binary_name":"libtiff-tools"},{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.9","binary_name":"libtiff5"},{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.9","binary_name":"libtiff5-dev"},{"binary_version":"4.1.0+git191117-2ubuntu0.20.04.9","binary_name":"libtiffxx5"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2022-48281","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-2908","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-3316","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2023-3618","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-25433","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-26965","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2023-26966","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-38288","severity":[{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-38289","severity":[{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6290-1.json"}},{"package":{"name":"tiff","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/tiff@4.3.0-6ubuntu0.5?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.3.0-6ubuntu0.5"}]}],"versions":["4.3.0-1","4.3.0-2","4.3.0-3","4.3.0-3build1","4.3.0-4","4.3.0-5","4.3.0-6","4.3.0-6ubuntu0.1","4.3.0-6ubuntu0.2","4.3.0-6ubuntu0.3","4.3.0-6ubuntu0.4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.3.0-6ubuntu0.5","binary_name":"libtiff-dev"},{"binary_version":"4.3.0-6ubuntu0.5","binary_name":"libtiff-opengl"},{"binary_version":"4.3.0-6ubuntu0.5","binary_name":"libtiff-tools"},{"binary_version":"4.3.0-6ubuntu0.5","binary_name":"libtiff5"},{"binary_version":"4.3.0-6ubuntu0.5","binary_name":"libtiff5-dev"},{"binary_version":"4.3.0-6ubuntu0.5","binary_name":"libtiffxx5"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2022-48281","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-2908","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-3316","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2023-3618","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-25433","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-26965","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2023-26966","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-38288","severity":[{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-38289","severity":[{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6290-1.json"}}],"schema_version":"1.7.3"}