SUSE-SU-2022:1882-1 -- SLES tiff, libtiff-devel, libtiff5ID: oval:org.secpod.oval:def:89047418 | Date: (C)2022-11-04 (M)2023-12-26 |
Class: PATCH | Family: unix |
This update for tiff fixes the following issues: - CVE-2022-0561: Fixed null source pointer passed as an argument to memcpy within TIFFFetchStripThing in tif_dirread.c . - CVE-2022-0562: Fixed null source pointer passed as an argument to memcpy within TIFFReadDirectory in tif_dirread.c . - CVE-2022-0865: Fixed assertion failure in TIFFReadAndRealloc . - CVE-2022-0909: Fixed divide by zero error in tiffcrop that could have led to a denial-of-service via a crafted tiff file . - CVE-2022-0924: Fixed out-of-bounds read error in tiffcp that could have led to a denial-of-service via a crafted tiff file . - CVE-2022-0908: Fixed null source pointer passed as an argument to memcpy in TIFFFetchNormalTag . - CVE-2022-1056: Fixed out-of-bounds read error in tiffcrop that could have led to a denial-of-service via a crafted tiff file . - CVE-2022-0891: Fixed heap buffer overflow in extractImageSection .
Platform: |
SUSE Linux Enterprise Desktop 15 SP4 |
SUSE Linux Enterprise Server 15 SP4 |
SUSE Linux Enterprise Server 15 SP3 |
SUSE Linux Enterprise Desktop 15 SP3 |
Product: |
tiff |
libtiff-devel |
libtiff5 |