Debian Linux Security Advisory 5333-1 - Several buffer overflow, divide by zero or out of bounds read/write vulnerabilities were discovered in tiff, the Tag Image File Format (TIFF) library and tools, which may cause denial of service when processing a crafted TIFF image.
e8e33bb105428cea88e46086e63362e8bad0286aef80d357f8678c42d5b9f9b6
Red Hat Security Advisory 2022-8194-01 - The libtiff packages contain a library of functions for manipulating Tagged Image File Format files. Issues addressed include buffer overflow, denial of service, and out of bounds read vulnerabilities.
a7335970eb93f38ec1e86e4d351218867c61ef9c4a022cf6a1b98d5b202225a1
Gentoo Linux Security Advisory 202210-10 - Multiple vulnerabilities have been found in LibTIFF, the worst of which could result in denial of service. Versions less than 4.4.0 are affected.
837c33fd1a8410aeb13cb5c7b1c84c8da0e98c9c01395a8cf688dca55d701ad2
Ubuntu Security Notice 5619-1 - It was discovered that LibTIFF was not properly performing the calculation of data that would eventually be used as a reference for bound-checking operations. An attacker could possibly use this issue to cause a denial of service or to expose sensitive information. This issue only affected Ubuntu 18.04 LTS. It was discovered that LibTIFF was not properly terminating a function execution when processing incorrect data. An attacker could possibly use this issue to cause a denial of service or to expose sensitive information. This issue only affected Ubuntu 18.04 LTS.
874eb330e0f797a6a5f345bf829b68bb90c1d9ebe271887d31824c498314f317