First published: Tue Aug 30 2022(Updated: )
It was found in libtiff 4.4.0rc1 that there is an invalid pointer free operation in TIFFClose() at tif_close.c:131 called by tiffcrop.c:2522 that can cause a program crash and denial of service while processing crafted input. Upstream bug: <a href="https://gitlab.com/libtiff/libtiff/-/issues/422">https://gitlab.com/libtiff/libtiff/-/issues/422</a> Upstream fix: <a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/378">https://gitlab.com/libtiff/libtiff/-/merge_requests/378</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2122799 is categorized as high due to the potential for program crashes and denial of service.
To fix REDHAT-BUG-2122799, update libtiff to the latest stable version that includes the necessary patches.
The vulnerability in REDHAT-BUG-2122799 is caused by an invalid pointer free operation in the TIFFClose() function.
Affected software versions of REDHAT-BUG-2122799 include libtiff 4.4.0rc1 and potentially earlier versions.
The potential impact of REDHAT-BUG-2122799 includes arbitrary program crashes and denial of service when processing crafted input.