ALAS2-2022-1799

Related Vulnerabilities: CVE-2022-0562  

A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFReadDirectory() in tif_dirread.c. This flaw allows an attacker to exploit this vulnerability via a crafted TIFF file, causing a crash and leading to a denial of service. (CVE-2022-0562)

ALAS2-2022-1799


Amazon Linux 2 Security Advisory: ALAS-2022-1799
Advisory Release Date: 2022-05-31 23:50 Pacific
Advisory Updated Date: 2022-06-07 19:24 Pacific
Severity: Medium
References: CVE-2022-0562 

Issue Overview:

A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFReadDirectory() in tif_dirread.c. This flaw allows an attacker to exploit this vulnerability via a crafted TIFF file, causing a crash and leading to a denial of service. (CVE-2022-0562)


Affected Packages:

libtiff


Issue Correction:
Run yum update libtiff to update your system.

New Packages:
aarch64:
    libtiff-4.0.3-35.amzn2.0.2.aarch64
    libtiff-devel-4.0.3-35.amzn2.0.2.aarch64
    libtiff-static-4.0.3-35.amzn2.0.2.aarch64
    libtiff-tools-4.0.3-35.amzn2.0.2.aarch64
    libtiff-debuginfo-4.0.3-35.amzn2.0.2.aarch64

i686:
    libtiff-4.0.3-35.amzn2.0.2.i686
    libtiff-devel-4.0.3-35.amzn2.0.2.i686
    libtiff-static-4.0.3-35.amzn2.0.2.i686
    libtiff-tools-4.0.3-35.amzn2.0.2.i686
    libtiff-debuginfo-4.0.3-35.amzn2.0.2.i686

src:
    libtiff-4.0.3-35.amzn2.0.2.src

x86_64:
    libtiff-4.0.3-35.amzn2.0.2.x86_64
    libtiff-devel-4.0.3-35.amzn2.0.2.x86_64
    libtiff-static-4.0.3-35.amzn2.0.2.x86_64
    libtiff-tools-4.0.3-35.amzn2.0.2.x86_64
    libtiff-debuginfo-4.0.3-35.amzn2.0.2.x86_64