--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-c39720a0ed
2022-04-03 00:15:07.259175
--------------------------------------------------------------------------------
Name : libtiff
Product : Fedora 36
Version : 4.3.0
Release : 6.fc36
URL :
http://www.simplesystems.org/libtiff/
Summary : Library of functions for manipulating TIFF format image files
Description :
The libtiff package contains a library of functions for manipulating
TIFF (Tagged Image File Format) image format files. TIFF is a widely
used file format for bitmapped images. TIFF files usually end in the
.tif extension and they are often quite large.
The libtiff package should be installed if you need to manipulate TIFF
format image files.
--------------------------------------------------------------------------------
Update Information:
Security fixes for: * CVE-2022-0865 * CVE-2022-0891 * CVE-2022-0907 *
CVE-2022-0908 * CVE-2022-0909 * CVE-2022-0924
--------------------------------------------------------------------------------
ChangeLog:
* Fri Mar 18 2022 Nikola Forr�� <nforro(a)redhat.com> - 4.3.0-6
- Fix CVE-2022-0907 (#2064147), CVE-2022-0908 (#2064153) and CVE-2022-0909 (#2064152)
* Fri Mar 18 2022 Nikola Forr�� <nforro(a)redhat.com> - 4.3.0-5
- Fix CVE-2022-0865 (#2065359), CVE-2022-0891 (#2065389) and CVE-2022-0924 (#2064154)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2064147 - CVE-2022-0907 libtiff: tiff: NULL Pointer Dereference in tiffcrop
[fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2064147
[ 2 ] Bug #2064152 - CVE-2022-0909 libtiff: tiff: Divide By Zero error in tiffcrop
[fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2064152
[ 3 ] Bug #2064153 - CVE-2022-0908 libtiff: tiff: Null source pointer passed as an
argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2064153
[ 4 ] Bug #2064154 - CVE-2022-0924 libtiff: Out-of-bounds Read error in tiffcp
[fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2064154
[ 5 ] Bug #2065359 - CVE-2022-0865 libtiff: reachable assertion [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2065359
[ 6 ] Bug #2065389 - CVE-2022-0891 libtiff: heap buffer overflow in extractImageSection
[fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2065389
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-c39720a0ed' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------