Mageia 2022-0337: libtiff security update | LinuxSecurity.com

Advisories

MGASA-2022-0337 - Updated libtiff packages fix security vulnerability

Publication date: 16 Sep 2022
URL: https://advisories.mageia.org/MGASA-2022-0337.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2022-2867,
     CVE-2022-2868,
     CVE-2022-2869

libtiff's tiffcrop utility has a uint32_t underflow that can lead to out
of bounds read and write. An attacker who supplies a crafted file to
tiffcrop (likely via tricking a user to run tiffcrop on it with certain
parameters) could cause a crash or in some cases, further exploitation.
(CVE-2022-2867)

libtiff's tiffcrop utility has a improper input validation flaw that can
lead to out of bounds read and ultimately cause a crash if an attacker is
able to supply a crafted file to tiffcrop. (CVE-2022-2868)

libtiff's tiffcrop tool has a uint32_t underflow which leads to out of
bounds read and write in the extractContigSamples8bits routine. An
attacker who supplies a crafted file to tiffcrop could trigger this flaw,
most likely by tricking a user into opening the crafted file with
tiffcrop. Triggering this flaw could cause a crash or potentially further
exploitation. (CVE-2022-2869)

References:
- https://bugs.mageia.org/show_bug.cgi?id=30836
- https://ubuntu.com/security/notices/USN-5604-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2867
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2868
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2869

SRPMS:
- 8/core/libtiff-4.2.0-1.8.mga8

Mageia 2022-0337: libtiff security update

libtiff's tiffcrop utility has a uint32_t underflow that can lead to out of bounds read and write

Summary

libtiff's tiffcrop utility has a uint32_t underflow that can lead to out of bounds read and write. An attacker who supplies a crafted file to tiffcrop (likely via tricking a user to run tiffcrop on it with certain parameters) could cause a crash or in some cases, further exploitation. (CVE-2022-2867)
libtiff's tiffcrop utility has a improper input validation flaw that can lead to out of bounds read and ultimately cause a crash if an attacker is able to supply a crafted file to tiffcrop. (CVE-2022-2868)
libtiff's tiffcrop tool has a uint32_t underflow which leads to out of bounds read and write in the extractContigSamples8bits routine. An attacker who supplies a crafted file to tiffcrop could trigger this flaw, most likely by tricking a user into opening the crafted file with tiffcrop. Triggering this flaw could cause a crash or potentially further exploitation. (CVE-2022-2869)

References

- https://bugs.mageia.org/show_bug.cgi?id=30836

- https://ubuntu.com/security/notices/USN-5604-1

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2867

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2868

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2869

Resolution

MGASA-2022-0337 - Updated libtiff packages fix security vulnerability

SRPMS

- 8/core/libtiff-4.2.0-1.8.mga8

Severity
Publication date: 16 Sep 2022
URL: https://advisories.mageia.org/MGASA-2022-0337.html
Type: security
CVE: CVE-2022-2867, CVE-2022-2868, CVE-2022-2869

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.