OESA-2024-2045

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2045
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-2045.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2024-2045
Upstream
Published
2024-08-23T11:08:56Z
Modified
2025-09-03T06:20:45.024452Z
Summary
libtiff security update
Details

This provides support for the Tag Image File Format (TIFF), a widely used format for storing image data. The latest version of the TIFF specification is available on-line in several different formats.And contains command-line programs for manipulating TIFF format image files using the libtiff library.

Security Fix(es):

A null pointer dereference flaw was found in Libtiff via tif_dirinfo.c. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.(CVE-2024-7006)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP4 / libtiff

Package

Name
libtiff
Purl
pkg:rpm/openEuler/libtiff&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3.0-24.oe2003sp4

Ecosystem specific

{
    "noarch": [
        "libtiff-help-4.3.0-24.oe2003sp4.noarch.rpm"
    ],
    "src": [
        "libtiff-4.3.0-24.oe2003sp4.src.rpm"
    ],
    "x86_64": [
        "libtiff-4.3.0-24.oe2003sp4.x86_64.rpm",
        "libtiff-debuginfo-4.3.0-24.oe2003sp4.x86_64.rpm",
        "libtiff-debugsource-4.3.0-24.oe2003sp4.x86_64.rpm",
        "libtiff-devel-4.3.0-24.oe2003sp4.x86_64.rpm"
    ],
    "aarch64": [
        "libtiff-4.3.0-24.oe2003sp4.aarch64.rpm",
        "libtiff-debuginfo-4.3.0-24.oe2003sp4.aarch64.rpm",
        "libtiff-debugsource-4.3.0-24.oe2003sp4.aarch64.rpm",
        "libtiff-devel-4.3.0-24.oe2003sp4.aarch64.rpm"
    ]
}