Release date:
2025-04-24 21:49:09 UTC
Description:
- CVE-2023-40745: prevent integer overflow on hostile images to avoid heap-based buffer
overflow and potential code execution
- CVE-2023-41175: address integer overflows and bypass in raw2tiff.c to prevent heap-based
buffer overflow and potential code execution
Updated packages:
-
libtiff-4.4.0-8.el9_2.tuxcare.els4.i686.rpm
sha:85de303cee85ab641d351cd3019b95230a093540351b39468aa9684c51d56ce1
-
libtiff-4.4.0-8.el9_2.tuxcare.els4.x86_64.rpm
sha:a10904febf9e540be3536f3c9f1fbdd99d769f4040afd7213909ad66e8a3f6a0
-
libtiff-devel-4.4.0-8.el9_2.tuxcare.els4.i686.rpm
sha:8c67f00b1f4e0a212af9c0aa485f50206e03d1720b31d758ad6772d06e78b67e
-
libtiff-devel-4.4.0-8.el9_2.tuxcare.els4.x86_64.rpm
sha:be040e2aeac1fb4fdc398788ae922c6f78c38c7e38e86d305a1296636042d0da
-
libtiff-static-4.4.0-8.el9_2.tuxcare.els4.x86_64.rpm
sha:6c6bd970b60b796d2102199ce873dc6958aa406f27a43d63c612248a799be102
-
libtiff-tools-4.4.0-8.el9_2.tuxcare.els4.x86_64.rpm
sha:f6cd83c09139a63a9d931c5954f6ae951e60245994bae2001f8d0a45303e2522
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.