Mageia 2022-0087: libtiff security update
Summary
Null source pointer passed as an argument to memcpy() function within
TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to
4.3.0 could lead to Denial of Service via crafted TIFF file.
(CVE-2022-0561)
Null source pointer passed as an argument to memcpy() function within
TIFFReadDirectory() in tif_dirread.c in libtiff versions from 4.0 to 4.3.0
could lead to Denial of Service via crafted TIFF file. (CVE-2022-0562)
References
- https://bugs.mageia.org/show_bug.cgi?id=30108
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562
Resolution
MGASA-2022-0087 - Updated libtiff packages fix security vulnerability
SRPMS
- 8/core/libtiff-4.2.0-1.2.mga8