Bug 2042603 (CVE-2022-22844) - CVE-2022-22844 libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c
Summary: CVE-2022-22844 libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c
Keywords:
Status: NEW
Alias: CVE-2022-22844
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2042605 2042604 2042767 2042768 2042769
Blocks: 2042606
TreeView+ depends on / blocked
 
Reported: 2022-01-19 19:36 UTC by Guilherme de Almeida Suckevicz
Modified: 2022-11-15 10:35 UTC (History)
16 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A buffer overflow vulnerability was found in libtiff. This flaw allows an attacker with network access to pass specially crafted files, causing an application to halt or crash. The root cause of this issue was from the memcpy function in tif_unix.c.
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:7585 0 None None None 2022-11-08 09:45:01 UTC
Red Hat Product Errata RHSA-2022:8194 0 None None None 2022-11-15 10:35:15 UTC

Description Guilherme de Almeida Suckevicz 2022-01-19 19:36:18 UTC
LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.

Reference:
https://gitlab.com/libtiff/libtiff/-/issues/355

Upstream patch:
https://gitlab.com/libtiff/libtiff/-/merge_requests/287

Comment 1 Guilherme de Almeida Suckevicz 2022-01-19 19:36:39 UTC
Created libtiff tracking bugs for this issue:

Affects: fedora-all [bug 2042604]


Created mingw-libtiff tracking bugs for this issue:

Affects: fedora-all [bug 2042605]

Comment 6 errata-xmlrpc 2022-11-08 09:44:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7585 https://access.redhat.com/errata/RHSA-2022:7585

Comment 7 errata-xmlrpc 2022-11-15 10:35:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:8194 https://access.redhat.com/errata/RHSA-2022:8194


Note You need to log in before you can comment on or make changes to this bug.