Null source pointer passed as an argument to memcpy() function within TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, the fix is available with commit eecb0712. https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef https://gitlab.com/libtiff/libtiff/-/issues/362 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
Created libtiff tracking bugs for this issue: Affects: fedora-all [bug 2054499] Created mingw-libtiff tracking bugs for this issue: Affects: fedora-all [bug 2054497]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:7585 https://access.redhat.com/errata/RHSA-2022:7585
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:8194 https://access.redhat.com/errata/RHSA-2022:8194
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-0561