First published: Tue Aug 30 2022(Updated: )
It was found in libtiff 4.4.0rc1 that there is an invalid pointer free operation in TIFFClose() at tif_close.c:131 called by tiffcrop.c:2522 that can cause a program crash and denial of service while processing crafted input.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libtiff Libtiff | =4.4.0-rc1 | |
Debian Debian Linux | =11.0 | |
debian/tiff | <=4.1.0+git191117-2~deb10u4<=4.1.0+git191117-2~deb10u8 | 4.2.0-1+deb11u4 4.2.0-1+deb11u5 4.5.0-6+deb12u1 4.5.1+git230720-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-2521.
The affected software is libtiff, and the version range is 4.1.0+git191117-2~deb10u4 to 4.5.1+git230720-1.
The severity of CVE-2022-2521 is low.
This vulnerability can be exploited by processing crafted input in TIFFClose() function, leading to a program crash and denial of service.
To fix CVE-2022-2521, update libtiff to version 4.2.0-1+deb11u4, 4.5.0-6, or 4.5.1+git230720-1.