In libtiff's tiffcrop (tools/tiffcrop.c) utility, there is a uint32_t underflow that leads to an out-of-bounds read and write. A crafted file could trigger this flaw when certain command line arguments are also supplied. References: 1. https://gitlab.com/libtiff/libtiff/-/issues/352 2. https://gitlab.com/libtiff/libtiff/-/merge_requests/294/diffs?commit_id=bcf28bb7f630f24fa47701a9907013f3548092cd
Created iv tracking bugs for this issue: Affects: fedora-35 [bug 2118872] Affects: fedora-36 [bug 2118874] Created libtiff tracking bugs for this issue: Affects: fedora-35 [bug 2118871] Affects: fedora-36 [bug 2118875] Created mingw-libtiff tracking bugs for this issue: Affects: fedora-35 [bug 2118873] Affects: fedora-36 [bug 2118876]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0095 https://access.redhat.com/errata/RHSA-2023:0095
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-2869