The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
- libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
- libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
- libtiff: reachable assertion (CVE-2022-0865)
- libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
- libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
- libtiff: out-of-bounds read in TIFFmemcpy() in tifunix.c (CVE-2022-22844)
- libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
- tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
- tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)
- libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c (CVE-2022-1354)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.