CVE-2022-0891

NameCVE-2022-0891
DescriptionA heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-5108-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tiff (PTS)stretch4.0.8-2+deb9u5vulnerable
stretch (security)4.0.8-2+deb9u8vulnerable
buster4.1.0+git191117-2~deb10u3vulnerable
buster (security)4.1.0+git191117-2~deb10u4fixed
bullseye4.2.0-1vulnerable
bullseye (security)4.2.0-1+deb11u1fixed
bookworm4.3.0-8fixed
sid4.4.0~rc1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tiffsourcebuster4.1.0+git191117-2~deb10u4DSA-5108-1
tiffsourcebullseye4.2.0-1+deb11u1DSA-5108-1
tiffsource(unstable)4.3.0-6

Notes

https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/libtiff/libtiff/-/issues/380
https://gitlab.com/libtiff/libtiff/-/issues/382

Search for package or bug name: Reporting problems