Download
| Alert*
oval:org.secpod.oval:def:3300637
SUSE Security Update: Security update for tiff oval:org.secpod.oval:def:85473 tiff: Tag Image File Format library Several security issues were fixed in LibTIFF. oval:org.secpod.oval:def:89048114 This update for tiff fixes the following issues: - CVE-2022-3570: Fixed a potential crash in the tiffcrop utility . - CVE-2022-3598: Fixed a potential crash in the tiffcrop utility . oval:org.secpod.oval:def:89048035 This update for tiff fixes the following issues: - CVE-2022-3570: Fixed heap buffer overflows in tiffcrop.c . - CVE-2022-3598: Fixed out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c [bsc#1204642] oval:org.secpod.oval:def:86630 tiff: Tag Image File Format library Several security issues were fixed in LibTIFF. oval:org.secpod.oval:def:89334 Several buffer overflow, divide by zero or out of bounds read/write vulnerabilities were discovered in tiff, the Tag Image File Format library and tools, which may cause denial of service when processing a crafted TIFF image. oval:org.secpod.oval:def:707796 tiff: Tag Image File Format library Several security issues were fixed in LibTIFF. oval:org.secpod.oval:def:2107833 Oracle Solaris 11 - ( CVE-2022-3597 ) oval:org.secpod.oval:def:19500717 Multiple heap buffer overflows in tiffcrop.c utility in libtiff library Version 4.4.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact oval:org.secpod.oval:def:2600214 The libtiff packages contain a library of functions for manipulating Tagged Image File Format files. oval:org.secpod.oval:def:1506671 [4.4.0-7] - Fix CVE-2022-3970 - Resolves: CVE-2022-3970 [4.4.0-6] - Fix CVE-2022-3597 CVE-2022-3626 CVE-2022-3599 CVE-2022-3570 CVE-2022-3598 CVE-2022-3627 - Resolves: CVE-2022-3597 CVE-2022-3626 CVE-2022-3599 CVE-2022-3570 CVE-2022-3598 CVE-2022-3627 oval:org.secpod.oval:def:507649 The libtiff packages contain a library of functions for manipulating Tagged Image File Format files. Security Fix: * libtiff: heap Buffer overflows in tiffcrop.c * libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix * libtiff: out-of-bounds write in extractContigSamplesShifted24bits i ... oval:org.secpod.oval:def:610364 Several buffer overflow, divide by zero or out of bounds read/write vulnerabilities were discovered in tiff, the Tag Image File Format library and tools, which may cause denial of service when processing a crafted TIFF image. |