Bug 2064145 (CVE-2022-0908)
Summary: | CVE-2022-0908 tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | TEJ RATHI <trathi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | erik-fedora, mike, mmuzila, neuro-sig, nforro, phracek, rh-spice-bugs |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in LibTIFF where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchNormalTag() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to cause a crash that leads to a denial of service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-12-06 21:03:12 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2064149, 2064153, 2071956, 2071957, 2071958 | ||
Bug Blocks: | 2064157 |
Description
TEJ RATHI
2022-03-15 07:14:41 UTC
Created libtiff tracking bugs for this issue: Affects: fedora-all [bug 2064153] Created mingw-libtiff tracking bugs for this issue: Affects: fedora-all [bug 2064149] Hi Tej, Sorry---could you explain what the neuro-sig needs to do here? I checked and we don't maintain libtiff as one of our group packages. Are some of our packages affected by this too? Cheers, Hello Ankur, neuro-sig is CC'd into this automatically by Bugzilla, when I created this flaw bug. Libtiff is only affected. Just ignore this if it isn't related to you. Sorry for the noise in your inbox. Thank you. Thanks, I'll remove us from the CC list otherwise it'll keep being listed in our bugs and cause confusion. This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:7585 https://access.redhat.com/errata/RHSA-2022:7585 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:8194 https://access.redhat.com/errata/RHSA-2022:8194 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-0908 |