RLSA-2024:5079

Source
https://errata.rockylinux.org/RLSA-2024:5079
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:5079.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:5079
Related
Published
2024-08-21T14:52:31.100489Z
Modified
2024-08-21T14:54:44.680636Z
Summary
Moderate: libtiff security update
Details

The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.

Security Fix(es):

  • libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c (CVE-2018-15209)

  • libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c (CVE-2023-25433)

  • libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c (CVE-2023-6228)

  • libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service (CVE-2023-52356)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / libtiff

Package

Name
libtiff
Purl
pkg:rpm/rocky-linux/libtiff?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:4.0.9-32.el8_10