Bug 2064411 (CVE-2022-0891)

Summary: CVE-2022-0891 libtiff: heap buffer overflow in extractImageSection
Product: [Other] Security Response Reporter: Nick Tait <ntait>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: erik-fedora, mike, mmuzila, nforro, phracek, rh-spice-bugs
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-12-06 23:03:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2065375, 2065377, 2065378, 2065379, 2065380, 2065389, 2065390    
Bug Blocks: 2062928    

Description Nick Tait 2022-03-15 18:51:26 UTC
A heap buffer overflow in libtiff library Version 4.3.0 may allow an attacker to trigger an unsafe memory access. Using a crafted TIFF image file could result into application crash, potential information disclosure or any other context-dependent impact.

Upstream fix:
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c

Comment 3 Todd Cullum 2022-03-17 18:49:16 UTC
Created libtiff tracking bugs for this issue:

Affects: fedora-all [bug 2065389]


Created mingw-libtiff tracking bugs for this issue:

Affects: fedora-all [bug 2065390]

Comment 6 errata-xmlrpc 2022-11-08 09:45:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7585 https://access.redhat.com/errata/RHSA-2022:7585

Comment 7 errata-xmlrpc 2022-11-15 10:35:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:8194 https://access.redhat.com/errata/RHSA-2022:8194

Comment 8 Product Security DevOps Team 2022-12-06 23:03:09 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-0891