First published: Tue Mar 15 2022(Updated: )
Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file. <a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json</a> <a href="https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85">https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85</a> <a href="https://gitlab.com/libtiff/libtiff/-/issues/383">https://gitlab.com/libtiff/libtiff/-/issues/383</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff | <=4.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2064145 is categorized as a Denial of Service vulnerability.
To fix REDHAT-BUG-2064145, update libtiff to version 4.3.0 or later.
libtiff versions prior to and including 4.3.0 are affected by REDHAT-BUG-2064145.
The impact of REDHAT-BUG-2064145 could lead to a Denial of Service when processing crafted TIFF files.
More information about REDHAT-BUG-2064145 can be found in the Red Hat bug report.