<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2024-0161</id>
    <title>An update for libtiff is now available for HCE 2.0</title>
    <severity>Moderate</severity>
    <release>HCE 2.0</release>
    <issued date="2024-06-28 03:57:35"/>
    <updated date="2024-06-28 03:57:35"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-2520" id="CVE-2022-2520" title="CVE-2022-2520 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1354" id="CVE-2022-1354" title="CVE-2022-1354 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-1916" id="CVE-2023-1916" title="CVE-2023-1916 Base Score: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-3164" id="CVE-2023-3164" title="CVE-2023-3164 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-4645" id="CVE-2022-4645" title="CVE-2022-4645 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-2521" id="CVE-2022-2521" title="CVE-2022-2521 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1623" id="CVE-2022-1623" title="CVE-2022-1623 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-0865" id="CVE-2022-0865" title="CVE-2022-0865 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-0907" id="CVE-2022-0907" title="CVE-2022-0907 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-0924" id="CVE-2022-0924" title="CVE-2022-0924 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-0909" id="CVE-2022-0909" title="CVE-2022-0909 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1622" id="CVE-2022-1622" title="CVE-2022-1622 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-2519" id="CVE-2022-2519" title="CVE-2022-2519 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1355" id="CVE-2022-1355" title="CVE-2022-1355 Base Score: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion fail in rotateImage() at tiffcrop.c:8621 that can cause program crash when reading a crafted input. (CVE-2022-2520)

A heap buffer overflow flaw was found in Libtiffs_x27; tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service. (CVE-2022-1354)

A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x. (CVE-2023-1916)

A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file. (CVE-2023-3164)

LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125. (CVE-2022-4645)

It was found in libtiff 4.4.0rc1 that there is an invalid pointer free operation in TIFFClose() at tif_close.c:131 called by tiffcrop.c:2522 that can cause a program crash and denial of service while processing crafted input. (CVE-2022-2521)

LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa. (CVE-2022-1623)

Reachable Assertion in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 5e180045. (CVE-2022-0865)

Unchecked Return Value to NULL Pointer Dereference in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f2b656e2. (CVE-2022-0907)

Out-of-bounds Read error in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 408976c4. (CVE-2022-0924)

Divide By Zero error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f8d0f9aa. (CVE-2022-0909)

LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa. (CVE-2022-1622)

There is a double free or corruption in rotateImage() at tiffcrop.c:8839 found in libtiff 4.4.0rc1 (CVE-2022-2519)

A stack buffer overflow flaw was found in Libtiffs_x27; tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service. (CVE-2022-1355)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="libtiff">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="libtiff" version="4.3.0" release="9.r26.hce2">
          <filename>libtiff-4.3.0-9.r26.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="libtiff-devel" version="4.3.0" release="9.r26.hce2">
          <filename>libtiff-devel-4.3.0-9.r26.hce2.aarch64.rpm</filename>
        </package>
        <package arch="noarch" name="libtiff-help" version="4.3.0" release="9.r26.hce2">
          <filename>libtiff-help-4.3.0-9.r26.hce2.noarch.rpm</filename>
        </package>
        <package arch="aarch64" name="libtiff-static" version="4.3.0" release="9.r26.hce2">
          <filename>libtiff-static-4.3.0-9.r26.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="libtiff-tools" version="4.3.0" release="9.r26.hce2">
          <filename>libtiff-tools-4.3.0-9.r26.hce2.aarch64.rpm</filename>
        </package>
        <package arch="x86_64" name="libtiff" version="4.3.0" release="9.r26.hce2">
          <filename>libtiff-4.3.0-9.r26.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="libtiff-devel" version="4.3.0" release="9.r26.hce2">
          <filename>libtiff-devel-4.3.0-9.r26.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="libtiff-static" version="4.3.0" release="9.r26.hce2">
          <filename>libtiff-static-4.3.0-9.r26.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="libtiff-tools" version="4.3.0" release="9.r26.hce2">
          <filename>libtiff-tools-4.3.0-9.r26.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
