Search for packages
| purl | pkg:rpm/redhat/libtiff@4.0.9-32?arch=el8_10 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-1asc-7axg-6ben
Aliases: CVE-2018-15209 |
security update | There are no reported fixed by versions. |
|
VCID-rp7t-x7gz-9udg
Aliases: CVE-2023-6228 |
libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c | There are no reported fixed by versions. |
|
VCID-ua38-ur2u-eues
Aliases: CVE-2023-52356 |
Out-of-bounds Write A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service. | There are no reported fixed by versions. |
|
VCID-z1vf-mhw2-ducs
Aliases: CVE-2023-25433 |
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||