Mageia 2022-0337: libtiff security update
Summary
libtiff's tiffcrop utility has a uint32_t underflow that can lead to out
of bounds read and write. An attacker who supplies a crafted file to
tiffcrop (likely via tricking a user to run tiffcrop on it with certain
parameters) could cause a crash or in some cases, further exploitation.
(CVE-2022-2867)
libtiff's tiffcrop utility has a improper input validation flaw that can
lead to out of bounds read and ultimately cause a crash if an attacker is
able to supply a crafted file to tiffcrop. (CVE-2022-2868)
libtiff's tiffcrop tool has a uint32_t underflow which leads to out of
bounds read and write in the extractContigSamples8bits routine. An
attacker who supplies a crafted file to tiffcrop could trigger this flaw,
most likely by tricking a user into opening the crafted file with
tiffcrop. Triggering this flaw could cause a crash or potentially further
exploitation. (CVE-2022-2869)
References
- https://bugs.mageia.org/show_bug.cgi?id=30836
- https://ubuntu.com/security/notices/USN-5604-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2867
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2868
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2869
Resolution
MGASA-2022-0337 - Updated libtiff packages fix security vulnerability
SRPMS
- 8/core/libtiff-4.2.0-1.8.mga8