Rocky Linux: RLSA-2024:5079 libtiff security update Security Advisories Updates
Summary
An update is available for libtiff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c (CVE-2018-15209) * libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c (CVE-2023-25433) * libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c (CVE-2023-6228) * libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service (CVE-2023-52356) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
RPMs
libtiff-0:4.0.9-32.el8_10.aarch64.rpm
libtiff-0:4.0.9-32.el8_10.i686.rpm
libtiff-0:4.0.9-32.el8_10.src.rpm
libtiff-0:4.0.9-32.el8_10.x86_64.rpm
libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64.rpm
libtiff-debuginfo-0:4.0.9-32.el8_10.i686.rpm
libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64.rpm
libtiff-debugsource-0:4.0.9-32.el8_10.aarch64.rpm
libtiff-debugsource-0:4.0.9-32.el8_10.i686.rpm
libtiff-debugsource-0:4.0.9-32.el8_10.x86_64.rpm
libtiff-devel-0:4.0.9-32.el8_10.aarch64.rpm
libtiff-devel-0:4.0.9-32.el8_10.i686.rpm
libtiff-devel-0:4.0.9-32.el8_10.x86_64.rpm
libtiff-tools-0:4.0.9-32.el8_10.aarch64.rpm
libtiff-tools-0:4.0.9-32.el8_10.x86_64.rpm
libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64.rpm
libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64.rpm
References
No References
CVEs
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6228
Fixes
https://bugzilla.redhat.com/show_bug.cgi?id=1614051
https://bugzilla.redhat.com/show_bug.cgi?id=2218744
https://bugzilla.redhat.com/show_bug.cgi?id=2240995
https://bugzilla.redhat.com/show_bug.cgi?id=2251344