[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2022:1667-1 -- SLES tiff, libtiff5

ID: oval:org.secpod.oval:def:89046303Date: (C)2022-05-25   (M)2023-12-26
Class: PATCHFamily: unix




This update for tiff fixes the following issues: - CVE-2022-0561: Fixed null source pointer passed as an argument to memcpy within TIFFFetchStripThing in tif_dirread.c . - CVE-2022-0562: Fixed null source pointer passed as an argument to memcpy within TIFFReadDirectory in tif_dirread.c . - CVE-2022-0865: Fixed assertion failure in TIFFReadAndRealloc . - CVE-2022-0909: Fixed divide by zero error in tiffcrop that could have led to a denial-of-service via a crafted tiff file . - CVE-2022-0924: Fixed out-of-bounds read error in tiffcp that could have led to a denial-of-service via a crafted tiff file . - CVE-2022-0908: Fixed null source pointer passed as an argument to memcpy in TIFFFetchNormalTag . - CVE-2022-1056: Fixed out-of-bounds read error in tiffcrop that could have led to a denial-of-service via a crafted tiff file . - CVE-2022-0891: Fixed heap buffer overflow in extractImageSection .

Platform:
SUSE Linux Enterprise Server 12 SP5
Product:
tiff
libtiff5
Reference:
SUSE-SU-2022:1667-1
CVE-2022-0561
CVE-2022-0562
CVE-2022-0865
CVE-2022-0891
CVE-2022-0908
CVE-2022-0909
CVE-2022-0924
CVE-2022-1056
CVE    8
CVE-2022-0909
CVE-2022-0561
CVE-2022-1056
CVE-2022-0562
...

© SecPod Technologies