An update is available for libtiff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c (CVE-2022-48281) * libtiff: out-of-bounds read in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0795) * libtiff: out-of-bounds read in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0796) * libtiff: out-of-bounds read in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0797) * libtiff: out-of-bounds read in extractContigSamplesShifted8bits() in tools/tiffcrop.c (CVE-2023-0798) * libtiff: use-after-free in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0799) * libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0800) * libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0801) * libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0802) * libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0803) * libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0804) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
libtiff-0:4.4.0-8.el9_2.i686.rpm
libtiff-0:4.4.0-8.el9_2.ppc64le.rpm
libtiff-0:4.4.0-8.el9_2.aarch64.rpm
libtiff-0:4.4.0-8.el9_2.s390x.rpm
libtiff-0:4.4.0-8.el9_2.src.rpm
libtiff-0:4.4.0-8.el9_2.x86_64.rpm
libtiff-debuginfo-0:4.4.0-8.el9_2.aarch64.rpm
libtiff-debuginfo-0:4.4.0-8.el9_2.ppc64le.rpm
libtiff-debuginfo-0:4.4.0-8.el9_2.s390x.rpm
libtiff-debuginfo-0:4.4.0-8.el9_2.x86_64.rpm
libtiff-debugsource-0:4.4.0-8.el9_2.aarch64.rpm
libtiff-debugsource-0:4.4.0-8.el9_2.ppc64le.rpm
libtiff-debugsource-0:4.4.0-8.el9_2.s390x.rpm
libtiff-debugsource-0:4.4.0-8.el9_2.x86_64.rpm
libtiff-devel-0:4.4.0-8.el9_2.aarch64.rpm
libtiff-devel-0:4.4.0-8.el9_2.i686.rpm
libtiff-devel-0:4.4.0-8.el9_2.ppc64le.rpm
libtiff-devel-0:4.4.0-8.el9_2.s390x.rpm
libtiff-devel-0:4.4.0-8.el9_2.x86_64.rpm
libtiff-tools-0:4.4.0-8.el9_2.aarch64.rpm
libtiff-tools-0:4.4.0-8.el9_2.ppc64le.rpm
libtiff-tools-0:4.4.0-8.el9_2.s390x.rpm
libtiff-tools-0:4.4.0-8.el9_2.x86_64.rpm
libtiff-tools-debuginfo-0:4.4.0-8.el9_2.aarch64.rpm
libtiff-tools-debuginfo-0:4.4.0-8.el9_2.ppc64le.rpm
libtiff-tools-debuginfo-0:4.4.0-8.el9_2.s390x.rpm
libtiff-tools-debuginfo-0:4.4.0-8.el9_2.x86_64.rpm
No References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0801
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0804
https://bugzilla.redhat.com/show_bug.cgi?id=2163606
https://bugzilla.redhat.com/show_bug.cgi?id=2170119
https://bugzilla.redhat.com/show_bug.cgi?id=2170146
https://bugzilla.redhat.com/show_bug.cgi?id=2170151
https://bugzilla.redhat.com/show_bug.cgi?id=2170157
https://bugzilla.redhat.com/show_bug.cgi?id=2170162
https://bugzilla.redhat.com/show_bug.cgi?id=2170167
https://bugzilla.redhat.com/show_bug.cgi?id=2170172
https://bugzilla.redhat.com/show_bug.cgi?id=2170178
https://bugzilla.redhat.com/show_bug.cgi?id=2170187
https://bugzilla.redhat.com/show_bug.cgi?id=2170192