libtiff vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libtiff package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
CVE-2022-48281

*
  • M
Integer Overflow to Buffer Overflow

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Write

*
  • M
Heap-based Buffer Overflow

*
  • M
Out-of-bounds Write

*
  • M
Heap-based Buffer Overflow

*
  • L
Incorrect Calculation of Buffer Size

*
  • M
Double Free

*
  • L
Release of Invalid Pointer or Reference

*
  • L
Improper Input Validation

*
  • M
Integer Underflow

*
  • M
Integer Underflow

*
  • M
Divide By Zero

*
  • M
Divide By Zero

*
  • M
Divide By Zero

*
  • L
Buffer Overflow

*
  • M
Reachable Assertion

*
  • M
Out-of-bounds Read

*
  • M
Out-of-Bounds

*
  • M
Use After Free

<0:3.9.4-10.el6_5
  • M
Out-of-bounds Write

<0:3.9.4-10.el6_5
  • M
Out-of-Bounds

<0:3.9.4-10.el6_5
  • M
Heap-based Buffer Overflow

<0:3.9.4-10.el6_5
  • M
Stack-based Buffer Overflow

<0:3.9.4-10.el6_5
  • M
Heap-based Buffer Overflow

<0:3.9.4-10.el6_5
  • M
Improper Input Validation

<0:3.9.4-10.el6_5
  • M
Heap-based Buffer Overflow

<0:3.9.4-21.el6_8
  • M
Heap-based Buffer Overflow

<0:3.9.4-21.el6_8
  • M
Heap-based Buffer Overflow

<0:3.9.4-21.el6_8
  • M
Integer Overflow or Wraparound

<0:3.9.4-21.el6_8
  • M
Heap-based Buffer Overflow

<0:3.9.4-21.el6_8
  • M
Out-of-bounds Write

<0:3.9.4-21.el6_8
  • M
Heap-based Buffer Overflow

<0:3.9.4-21.el6_8
  • M
Heap-based Buffer Overflow

<0:3.9.4-21.el6_8
  • M
Heap-based Buffer Overflow

<0:3.9.4-9.el6_3
  • M
Heap-based Buffer Overflow

<0:3.9.4-9.el6_3
  • H
Heap-based Buffer Overflow

<0:3.9.4-18.el6_8
  • H
Out-of-bounds Write

<0:3.9.4-18.el6_8
  • H
Out-of-Bounds

<0:3.9.4-18.el6_8
  • H
Out-of-bounds Read

<0:3.9.4-18.el6_8
  • H
Out-of-bounds Read

<0:3.9.4-18.el6_8
  • M
Out-of-bounds Write

<0:3.9.4-18.el6_8
  • M
Stack-based Buffer Overflow

<0:3.9.4-9.el6_3
  • M
Heap-based Buffer Overflow

<0:3.9.4-9.el6_3
  • H
Out-of-bounds Write

<0:3.9.4-18.el6_8
  • H
Out-of-bounds Write

<0:3.9.4-18.el6_8
  • H
Out-of-bounds Write

<0:3.9.4-18.el6_8
  • H
Out-of-bounds Write

<0:3.9.4-18.el6_8
  • H
Security Features

<0:3.9.4-18.el6_8
  • H
Out-of-bounds Read

<0:3.9.4-18.el6_8
  • H
Out-of-bounds Write

<0:3.9.4-18.el6_8
  • H
Out-of-bounds Write

<0:3.9.4-18.el6_8
  • H
Out-of-Bounds

<0:3.9.4-18.el6_8
  • H
Out-of-Bounds

<0:3.9.4-18.el6_8
  • H
Divide By Zero

<0:3.9.4-18.el6_8
  • H
Out-of-bounds Read

<0:3.9.4-18.el6_8
  • H
Out-of-bounds Write

<0:3.9.4-18.el6_8
  • H
Integer Overflow or Wraparound

<0:3.9.4-6.el6_3
  • H
Heap-based Buffer Overflow

<0:3.9.4-6.el6_3
  • H
Heap-based Buffer Overflow

<0:3.9.4-5.el6_2
  • H
Improper Handling of Syntactically Invalid Structure

<0:3.9.4-1.el6_0.3
  • H
Out-of-Bounds

<0:3.9.4-1.el6_0.1
  • H
Heap-based Buffer Overflow

<0:3.9.4-1.el6_0.2
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Stack-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • L
Resource Exhaustion

*
  • M
Out-of-bounds Read

*
  • L
Improper Initialization

*
  • L
Memory Leak

*
  • L
Resource Exhaustion

*
  • L
Memory Leak

*
  • L
Memory Leak

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Integer Overflow or Wraparound

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Incorrect Type Conversion or Cast

*
  • L
Out-of-Bounds

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Integer Overflow or Wraparound

*
  • M
Heap-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
Information Exposure

*
  • L
Reachable Assertion

*
  • L
Resource Exhaustion

*
  • L
Reachable Assertion

*
  • M
Heap-based Buffer Overflow

*
  • L
Improper Input Validation

*
  • M
Out-of-bounds Write

*
  • M
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

*
  • L
Improper Null Termination

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Stack-based Buffer Overflow

*
  • M
Divide By Zero

*
  • M
Heap-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Write

*
  • L
Divide By Zero

*
  • M
Out-of-bounds Write

*
  • M
Integer Overflow or Wraparound

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Divide By Zero

*
  • L
Heap-based Buffer Overflow

*
  • L
Integer Overflow or Wraparound

*
  • L
Divide By Zero

*
  • L
Heap-based Buffer Overflow

*
  • M
Off-by-one Error

*
  • M
Heap-based Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • L
Improper Clearing of Heap Memory Before Release ('Heap Inspection')

*
  • L
Heap-based Buffer Overflow

*
  • L
Integer Overflow or Wraparound

*
  • L
Out-of-bounds Write

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Write

*
  • M
Integer Overflow or Wraparound

*
  • L
Improper Input Validation

*
  • L
Out-of-Bounds

*
  • M
Heap-based Buffer Overflow

*
  • L
Integer Overflow or Wraparound

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • M
Heap-based Buffer Overflow

*