tiff vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the tiff package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Divide By Zero

*
  • M
Divide By Zero

*
  • M
Divide By Zero

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Stack-based Buffer Overflow

*
  • M
Out-of-bounds Read

*
  • M
Improper Resource Shutdown or Release

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Divide By Zero

*
  • M
NULL Pointer Dereference

*
  • M
Unchecked Return Value

*
  • H
Out-of-bounds Write

*
  • M
Reachable Assertion

*
  • M
NULL Pointer Dereference

<4.0.8-2+deb9u8
  • M
NULL Pointer Dereference

<4.0.8-2+deb9u8
  • M
Out-of-bounds Read

<4.0.8-2+deb9u8
  • M
Out-of-bounds Write

<4.0.8-2+deb9u7
  • H
Out-of-bounds Write

<4.0.8-2+deb9u7
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • H
Out-of-Bounds

<4.0.8-2+deb9u6
  • H
Integer Overflow or Wraparound

<4.0.8-2+deb9u6
  • H
Out-of-bounds Write

<4.0.8-2+deb9u5
  • M
Integer Overflow or Wraparound

<4.0.8-2+deb9u5
  • M
CVE-2019-7663

<4.0.8-2+deb9u5
  • L
Memory Leak

*
  • M
NULL Pointer Dereference

<4.0.8-2+deb9u5
  • L
NULL Pointer Dereference

*
  • H
Out-of-bounds Write

<4.0.8-2+deb9u4
  • H
Out-of-bounds Write

<4.0.8-2+deb9u2
  • M
NULL Pointer Dereference

<4.0.8-2+deb9u5
  • H
Out-of-bounds Write

<4.0.8-2+deb9u4
  • H
Out-of-bounds Write

<4.0.8-2+deb9u4
  • H
Integer Overflow or Wraparound

<4.0.8-2+deb9u5
  • H
Out-of-bounds Write

<4.0.8-2+deb9u4
  • L
Missing Release of Resource after Effective Lifetime

*
  • M
Out-of-bounds Write

<4.0.3-12.3
  • H
Out-of-bounds Write

<4.0.8-2+deb9u5
  • L
Reachable Assertion

<4.0.8-2+deb9u4
  • M
Missing Release of Resource after Effective Lifetime

<4.0.6-3
  • M
Out-of-bounds Read

<4.0.6-3
  • L
NULL Pointer Dereference

*
  • H
Out-of-bounds Write

<4.0.8-2+deb9u4
  • H
Out-of-bounds Write

<4.0.3-12.1
  • H
Out-of-bounds Write

<4.0.6-2
  • L
Divide By Zero

*
  • M
NULL Pointer Dereference

<4.0.8-2+deb9u4
  • M
Resource Exhaustion

<4.0.8-2+deb9u4
  • H
Out-of-bounds Read

<4.0.6-3
  • M
NULL Pointer Dereference

<4.0.8-2+deb9u2
  • L
Use After Free

*
  • L
Out-of-bounds Read

<4.0.6-3
  • H
Out-of-Bounds

<4.0.8-2+deb9u4
  • M
Reachable Assertion

<4.0.8-2+deb9u2
  • M
Reachable Assertion

<4.0.8-2+deb9u2
  • H
Allocation of Resources Without Limits or Throttling

<4.0.8-2+deb9u2
  • M
Improper Input Validation

<4.0.8-2+deb9u4
  • L
Out-of-bounds Write

<4.0.8-2+deb9u2
  • H
Improper Input Validation

<4.0.8-2+deb9u1
  • L
Out-of-bounds Read

<4.0.6-3
  • H
Out-of-bounds Read

<4.0.8-2+deb9u2
  • M
Missing Release of Resource after Effective Lifetime

<4.0.8-2+deb9u1
  • M
Missing Release of Resource after Effective Lifetime

<4.0.8-1
  • M
Missing Release of Resource after Effective Lifetime

<4.0.8-1
  • M
Missing Release of Resource after Effective Lifetime

<4.0.8-1
  • M
Out-of-bounds Read

<4.0.8-2
  • L
Out-of-bounds Read

*
  • L
Improper Input Validation

<4.0.7-7
  • M
Out-of-bounds Read

<4.0.7-1
  • H
Improper Input Validation

<4.0.7-6
  • L
Divide By Zero

<4.0.7-6
  • H
Improper Input Validation

<4.0.7-6
  • H
Integer Overflow or Wraparound

<4.0.7-6
  • H
Improper Input Validation

<4.0.7-6
  • L
Divide By Zero

<4.0.7-6
  • M
Out-of-Bounds

<4.0.7-6
  • L
Missing Release of Resource after Effective Lifetime

<4.0.7-6
  • H
Improper Input Validation

<4.0.7-6
  • H
Improper Input Validation

<4.0.7-6
  • H
Improper Input Validation

<4.0.7-6
  • L
Integer Underflow

<4.0.7-2
  • H
Out-of-bounds Read

<4.0.7-2
  • H
Out-of-Bounds

<4.0.7-2
  • M
Divide By Zero

<4.0.7-2
  • H
Out-of-bounds Read

<4.0.7-2
  • H
Out-of-Bounds

<4.0.7-2
  • M
Divide By Zero

<4.0.7-2
  • M
Resource Management Errors

<4.0.7-1
  • M
Out-of-bounds Read

<4.0.6-2
  • H
Out-of-Bounds

<4.0.7-2
  • M
Out-of-Bounds

<4.0.8-2
  • H
Numeric Errors

<4.0.7-4
  • H
Out-of-Bounds

<4.0.7-2
  • M
Out-of-bounds Read

<4.0.7-1
  • M
Improper Input Validation

<4.0.6-3
  • H
Out-of-bounds Write

<4.0.6-3
  • C
Numeric Errors

<4.0.6-2
  • L
Out-of-bounds Read

*
  • M
Out-of-Bounds

<4.0.6-3
  • M
Out-of-bounds Read

<4.0.6-2
  • L
Divide By Zero

<4.0.6-2
  • M
Out-of-Bounds

<4.0.6-3
  • M
Out-of-Bounds

<4.0.6-2
  • M
Out-of-Bounds

<4.0.6-2
  • M
Out-of-bounds Read

<4.0.7-1
  • H
Out-of-bounds Read

<4.0.7-1
  • C
Out-of-Bounds

<4.0.7-5
  • H
Out-of-Bounds

<4.0.6-3
  • H
Improper Input Validation

<4.0.3-12
  • C
Integer Overflow or Wraparound

<4.0.7-1
  • C
Out-of-Bounds

<4.0.7-1
  • C
Out-of-Bounds

<4.0.7-1
  • C
Out-of-Bounds

<4.0.7-1
  • C
Out-of-Bounds

<4.0.7-1
  • L
Out-of-Bounds

<4.0.7-1
  • C
Out-of-Bounds

<4.0.7-1
  • C
Out-of-Bounds

<4.0.7-1
  • H
CVE-2016-8331

<4.0.6-3
  • L
Out-of-bounds Read

<4.0.6-3
  • L
Out-of-bounds Read

<4.0.6-3
  • H
Out-of-bounds Read

<4.0.6-3
  • L
Out-of-bounds Read

<4.0.6-3
  • H
Out-of-bounds Read

<4.0.6-3
  • L
Divide By Zero

<4.0.6-3
  • L
Divide By Zero

<4.0.7-1
  • M
Out-of-bounds Read

<4.0.3-1
  • H
Out-of-bounds Read

<4.0.6-3
  • H
Out-of-bounds Write

<4.0.6-3
  • L
Out-of-bounds Read

<4.0.6-3
  • H
Out-of-bounds Write

<4.0.6-3
  • H
Out-of-Bounds

<4.0.7-1
  • H
Out-of-bounds Write

<4.0.7-1
  • H
Out-of-Bounds

<4.0.7-1
  • M
Out-of-Bounds

<4.0.6-3
  • M
Out-of-Bounds

<4.0.3-12.1
  • M
Out-of-Bounds

<4.0.3-12.1
  • M
Out-of-Bounds

<4.0.6-1
  • M
Out-of-Bounds

<4.0.6-1
  • M
Out-of-bounds Write

<4.0.6-1
  • M
Out-of-bounds Write

<4.0.6-1
  • M
Out-of-bounds Write

<4.0.6-1
  • M
Out-of-bounds Read

<4.0.6-1
  • C
Out-of-Bounds

<4.0.6-3
  • C
Security Features

<4.0.7-7
  • M
Numeric Errors

<4.0.3-12
  • M
Out-of-Bounds

<4.0.3-2
  • M
Out-of-Bounds

<4.0.3-3
  • L
Out-of-Bounds

<4.0.3-9
  • M
Resource Management Errors

<4.0.3-2
  • H
Out-of-Bounds

<4.0.2-6+nmu1
  • H
Out-of-Bounds

<4.0.2-6+nmu1
  • M
Out-of-Bounds

<4.0.2-1
  • M
CVE-2012-4564

<4.0.2-5
  • M
Out-of-Bounds

<4.0.2-4
  • M
Out-of-Bounds

<4.0.2-2
  • M
Numeric Errors

<4.0.2-1
  • H
Numeric Errors

<4.0-1
  • M
Numeric Errors

<4.0.1-2
  • M
Out-of-Bounds

<3.9.5-1
  • M
Out-of-Bounds

<3.9.4-9
  • H
Out-of-Bounds

<3.9.4-7
  • H
Out-of-Bounds

<3.9.4-1
  • M
Out-of-Bounds

<3.9.4-5
  • L
CVE-2010-2482

<3.9.4-1
  • M
Improper Input Validation

<3.9.4-1
  • L
Out-of-Bounds

<3.9.4-1
  • L
Out-of-Bounds

<3.9.4-4
  • M
Improper Input Validation

<3.9.6-1
  • H
Improper Input Validation

<3.9.4-2
  • M
Improper Input Validation

<3.9.6-1
  • M
Improper Input Validation

<3.9.4-1
  • M
Improper Input Validation

<3.9.6-1
  • L
Improper Input Validation

<4.0.6-1
  • L
CVE-2010-2443

<3.9.4-1
  • M
Out-of-Bounds

<3.9.4-1
  • M
Numeric Errors

<3.9.4-1
  • M
Numeric Errors

<3.9.4-1
  • H
Numeric Errors

<3.8.2-13
  • L
Out-of-Bounds

<3.8.2-12
  • M
Out-of-Bounds

<3.8.2-11
  • H
Out-of-Bounds

<3.8.2-6
  • H
Out-of-Bounds

<3.8.2-6
  • H
Out-of-Bounds

<3.8.2-6
  • H
CVE-2006-3465

<3.8.2-6
  • H
CVE-2006-3461

<3.8.2-6
  • H
Numeric Errors

<3.8.2-6
  • H
Out-of-Bounds

<3.8.2-6
  • M
CVE-2006-2193

<3.8.2-4
  • L
Out-of-Bounds

<3.8.2-3
  • M
CVE-2006-2120

<3.8.1
  • M
CVE-2006-2025

<3.8.1
  • M
CVE-2006-2024

<3.8.1
  • M
Out-of-Bounds

<3.8.1
  • M
CVE-2006-0405

<3.8.0-2
  • M
CVE-2005-2452

<3.7.0-1
  • H
CVE-2005-1544

<3.7.2-3
  • M
CVE-2004-0886

<3.6.1-2
  • C
CVE-2004-1308

<3.6.1-4
  • M
CVE-2004-1183

<3.6.1-5
  • H
CVE-2004-0803

<3.6.1-2
  • L
CVE-2004-1307

<3.7.0
  • M
Divide By Zero

<3.6.1-2