Search for packages
| purl | pkg:rpm/redhat/libtiff@4.4.0-15?arch=el9 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-a8jf-xmj8-cuh6
Aliases: CVE-2023-52355 |
This advisory is a False-Positive and has been removed as it only impacted documentation. | There are no reported fixed by versions. |
|
VCID-ua38-ur2u-eues
Aliases: CVE-2023-52356 |
Out-of-bounds Write A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-19T06:26:22.166834+00:00 | RedHat Importer | Affected by | VCID-ua38-ur2u-eues | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52356.json | 38.4.0 |
| 2026-04-10T08:23:20.286634+00:00 | RedHat Importer | Affected by | VCID-ua38-ur2u-eues | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52356.json | 38.1.0 |
| 2026-04-01T13:51:16.207233+00:00 | RedHat Importer | Affected by | VCID-ua38-ur2u-eues | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52356.json | 38.0.0 |
| 2026-04-01T13:51:16.167848+00:00 | RedHat Importer | Affected by | VCID-a8jf-xmj8-cuh6 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52355.json | 38.0.0 |