{"id":"RLSA-2023:3711","summary":"Moderate: libtiff security update","details":"The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c (CVE-2022-48281)\n\n* libtiff: out-of-bounds read in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0795)\n\n* libtiff: out-of-bounds read in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0796)\n\n* libtiff: out-of-bounds read in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0797)\n\n* libtiff: out-of-bounds read in extractContigSamplesShifted8bits() in tools/tiffcrop.c (CVE-2023-0798)\n\n* libtiff: use-after-free in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0799)\n\n* libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0800)\n\n* libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0801)\n\n* libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0802)\n\n* libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0803)\n\n* libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-03-11T06:22:21.837576Z","published":"2023-08-31T16:55:40.275990Z","upstream":["CVE-2022-48281","CVE-2023-0795","CVE-2023-0796","CVE-2023-0797","CVE-2023-0798","CVE-2023-0799","CVE-2023-0800","CVE-2023-0801","CVE-2023-0802","CVE-2023-0803","CVE-2023-0804"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2023:3711"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2163606"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170119"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170146"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170151"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170157"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170162"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170167"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170172"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170187"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170192"}],"affected":[{"package":{"name":"libtiff","ecosystem":"Rocky Linux:9","purl":"pkg:rpm/rocky-linux/libtiff?distro=rocky-linux-9&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.4.0-8.el9_2"}],"database_specific":{"yum_repository":"CRB"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2023:3711.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}