Description
Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5108-1 | tiff security update |
EUVD |
EUVD-2022-15938 | Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file. |
Ubuntu USN |
USN-5523-1 | LibTIFF vulnerabilities |
Ubuntu USN |
USN-5523-2 | LibTIFF vulnerabilities |
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: GitLab
Published:
Updated: 2024-08-02T23:47:42.818Z
Reserved: 2022-03-10T00:00:00.000Z
Link: CVE-2022-0908
No data.
Status : Modified
Published: 2022-03-11T18:15:27.077
Modified: 2024-11-21T06:39:38.823
Link: CVE-2022-0908
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN