LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
References
Configurations
History
18 Mar 2025, 20:27
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fedoraproject fedora
Fedoraproject |
|
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/ - Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/ - Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/ - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20230331-0001/ - Third Party Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* |
21 Nov 2024, 07:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json - Third Party Advisory | |
References | () https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246 - Patch | |
References | () https://gitlab.com/libtiff/libtiff/-/issues/277 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/ - | |
References | () https://security.netapp.com/advisory/ntap-20230331-0001/ - | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
31 Mar 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Mar 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Mar 2023, 06:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-125 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:* | |
References |
|
|
References | (CONFIRM) https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json - Third Party Advisory | |
References | (MISC) https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246 - Patch | |
References | (MISC) https://gitlab.com/libtiff/libtiff/-/issues/277 - Exploit, Issue Tracking, Vendor Advisory |
03 Mar 2023, 16:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-03 16:15
Updated : 2025-03-18 20:27
NVD link : CVE-2022-4645
Mitre link : CVE-2022-4645
CVE.ORG link : CVE-2022-4645
JSON object : View
Products Affected
fedoraproject
- fedora
libtiff
- libtiff
CWE
CWE-125
Out-of-bounds Read