MGASA-2022-0046

Source
https://advisories.mageia.org/MGASA-2022-0046.html
Import Source
https://advisories.mageia.org/MGASA-2022-0046.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0046
Related
Published
2022-02-02T21:29:30Z
Modified
2022-02-02T20:45:53Z
Summary
Updated libtiff packages fix security vulnerability
Details

LibTIFF 4.3.0 has an out-of-bounds read in TIFFmemcpy in tifunix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field. (CVE-2022-22844)

References
Credits

Affected packages