Bug 2233599 (CVE-2022-1056)

Summary: CVE-2022-1056 libtiff: heap-based buffer overflow in _TIFFmemcpy() in tif_unix.c
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: bdettelb, caswilli, dkuc, fjansen, hkataria, jburrell, jsherril, kaycoth, kshier, nforro
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: libtiff 4.4.0 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2233607, 2233608, 2233609, 2233610, 2233611, 2234393    
Bug Blocks: 2233605    

Description Guilherme de Almeida Suckevicz 2023-08-22 17:11:08 UTC
Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 46dc8fcd.

References:
https://gitlab.com/libtiff/libtiff/-/merge_requests/307
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json
https://gitlab.com/libtiff/libtiff/-/issues/391
https://security.gentoo.org/glsa/202210-10
https://security.netapp.com/advisory/ntap-20221228-0008/

Comment 2 Guilherme de Almeida Suckevicz 2023-08-22 17:29:15 UTC
Created libtiff tracking bugs for this issue:

Affects: fedora-all [bug 2233610]


Created mingw-libtiff tracking bugs for this issue:

Affects: fedora-all [bug 2233611]

Comment 3 Marian Rehak 2023-08-24 09:52:21 UTC
Created iv tracking bugs for this issue:

Affects: fedora-all [bug 2234393]