Updated libtiff packages fix security vulnerability
Publication date: 16 Sep 2022Modification date: 16 Sep 2022
Type: security
Affected Mageia releases : 8
CVE: CVE-2022-2867 , CVE-2022-2868 , CVE-2022-2869
Description
libtiff's tiffcrop utility has a uint32_t underflow that can lead to out
of bounds read and write. An attacker who supplies a crafted file to
tiffcrop (likely via tricking a user to run tiffcrop on it with certain
parameters) could cause a crash or in some cases, further exploitation.
(CVE-2022-2867)
libtiff's tiffcrop utility has a improper input validation flaw that can
lead to out of bounds read and ultimately cause a crash if an attacker is
able to supply a crafted file to tiffcrop. (CVE-2022-2868)
libtiff's tiffcrop tool has a uint32_t underflow which leads to out of
bounds read and write in the extractContigSamples8bits routine. An
attacker who supplies a crafted file to tiffcrop could trigger this flaw,
most likely by tricking a user into opening the crafted file with
tiffcrop. Triggering this flaw could cause a crash or potentially further
exploitation. (CVE-2022-2869)
References
SRPMS
8/core
- libtiff-4.2.0-1.8.mga8