{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2022-3970: fix integer overflow in TIFFReadRGBATileExt on strips/tiles > 2 GB\n- CVE-2022-0891: fix heap buffer overflow in extractImageSection in tiffcrop",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776350524",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776350524"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos7els/advisories/2026/clsa-2026_1776350524.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-23T08:37:43Z",
      "generator": {
        "date": "2026-04-23T08:37:43Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1776350524",
      "initial_release_date": "2026-04-16T14:42:06Z",
      "revision_history": [
        {
          "date": "2026-04-16T14:42:06Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-04-23T08:37:43Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "libtiff: Fix of 2 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 7",
                "product": {
                  "name": "Community Enterprise Operating System 7",
                  "product_id": "CentOS-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-static-0:4.0.3-35.el7.tuxcare.els8.i686",
                "product": {
                  "name": "libtiff-static-0:4.0.3-35.el7.tuxcare.els8.i686",
                  "product_id": "libtiff-static-0:4.0.3-35.el7.tuxcare.els8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libtiff-static@4.0.3-35.el7.tuxcare.els8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.i686",
                "product": {
                  "name": "libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.i686",
                  "product_id": "libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libtiff-devel@4.0.3-35.el7.tuxcare.els8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.3-35.el7.tuxcare.els8.i686",
                "product": {
                  "name": "libtiff-0:4.0.3-35.el7.tuxcare.els8.i686",
                  "product_id": "libtiff-0:4.0.3-35.el7.tuxcare.els8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libtiff@4.0.3-35.el7.tuxcare.els8?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-static-0:4.0.3-35.el7.tuxcare.els8.x86_64",
                "product": {
                  "name": "libtiff-static-0:4.0.3-35.el7.tuxcare.els8.x86_64",
                  "product_id": "libtiff-static-0:4.0.3-35.el7.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libtiff-static@4.0.3-35.el7.tuxcare.els8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.x86_64",
                "product": {
                  "name": "libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.x86_64",
                  "product_id": "libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libtiff-devel@4.0.3-35.el7.tuxcare.els8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.3-35.el7.tuxcare.els8.x86_64",
                "product": {
                  "name": "libtiff-tools-0:4.0.3-35.el7.tuxcare.els8.x86_64",
                  "product_id": "libtiff-tools-0:4.0.3-35.el7.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libtiff-tools@4.0.3-35.el7.tuxcare.els8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.3-35.el7.tuxcare.els8.x86_64",
                "product": {
                  "name": "libtiff-0:4.0.3-35.el7.tuxcare.els8.x86_64",
                  "product_id": "libtiff-0:4.0.3-35.el7.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libtiff@4.0.3-35.el7.tuxcare.els8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-static-0:4.0.3-35.el7.tuxcare.els8.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:libtiff-static-0:4.0.3-35.el7.tuxcare.els8.i686"
        },
        "product_reference": "libtiff-static-0:4.0.3-35.el7.tuxcare.els8.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-static-0:4.0.3-35.el7.tuxcare.els8.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:libtiff-static-0:4.0.3-35.el7.tuxcare.els8.x86_64"
        },
        "product_reference": "libtiff-static-0:4.0.3-35.el7.tuxcare.els8.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.i686"
        },
        "product_reference": "libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.3-35.el7.tuxcare.els8.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:libtiff-tools-0:4.0.3-35.el7.tuxcare.els8.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.0.3-35.el7.tuxcare.els8.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.3-35.el7.tuxcare.els8.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:libtiff-0:4.0.3-35.el7.tuxcare.els8.i686"
        },
        "product_reference": "libtiff-0:4.0.3-35.el7.tuxcare.els8.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.3-35.el7.tuxcare.els8.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:libtiff-0:4.0.3-35.el7.tuxcare.els8.x86_64"
        },
        "product_reference": "libtiff-0:4.0.3-35.el7.tuxcare.els8.x86_64",
        "relates_to_product_reference": "CentOS-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-3970",
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in LibTIFF. It has been classified as critical. This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getimage.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 227500897dfb07fb7d27f7aa570050e62617e3be. It is recommended to apply a patch to fix this issue. The identifier VDB-213549 was assigned to this vulnerability.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:libtiff-0:4.0.3-35.el7.tuxcare.els8.i686",
          "CentOS-7:libtiff-0:4.0.3-35.el7.tuxcare.els8.x86_64",
          "CentOS-7:libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.i686",
          "CentOS-7:libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.x86_64",
          "CentOS-7:libtiff-static-0:4.0.3-35.el7.tuxcare.els8.i686",
          "CentOS-7:libtiff-static-0:4.0.3-35.el7.tuxcare.els8.x86_64",
          "CentOS-7:libtiff-tools-0:4.0.3-35.el7.tuxcare.els8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-3970"
        },
        {
          "category": "external",
          "summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53137",
          "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53137"
        },
        {
          "category": "external",
          "summary": "https://gitlab.com/libtiff/libtiff/-/commit/227500897dfb07fb7d27f7aa570050e62617e3be",
          "url": "https://gitlab.com/libtiff/libtiff/-/commit/227500897dfb07fb7d27f7aa570050e62617e3be"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
        },
        {
          "category": "external",
          "summary": "https://oss-fuzz.com/download?testcase_id=5738253143900160",
          "url": "https://oss-fuzz.com/download?testcase_id=5738253143900160"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20221215-0009/",
          "url": "https://security.netapp.com/advisory/ntap-20221215-0009/"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213841",
          "url": "https://support.apple.com/kb/HT213841"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213843",
          "url": "https://support.apple.com/kb/HT213843"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?id.213549",
          "url": "https://vuldb.com/?id.213549"
        }
      ],
      "release_date": "2022-11-13T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-16T14:42:06.927478Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776350524",
          "product_ids": [
            "CentOS-7:libtiff-0:4.0.3-35.el7.tuxcare.els8.i686",
            "CentOS-7:libtiff-0:4.0.3-35.el7.tuxcare.els8.x86_64",
            "CentOS-7:libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.i686",
            "CentOS-7:libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.x86_64",
            "CentOS-7:libtiff-static-0:4.0.3-35.el7.tuxcare.els8.i686",
            "CentOS-7:libtiff-static-0:4.0.3-35.el7.tuxcare.els8.x86_64",
            "CentOS-7:libtiff-tools-0:4.0.3-35.el7.tuxcare.els8.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776350524"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:libtiff-0:4.0.3-35.el7.tuxcare.els8.i686",
            "CentOS-7:libtiff-0:4.0.3-35.el7.tuxcare.els8.x86_64",
            "CentOS-7:libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.i686",
            "CentOS-7:libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.x86_64",
            "CentOS-7:libtiff-static-0:4.0.3-35.el7.tuxcare.els8.i686",
            "CentOS-7:libtiff-static-0:4.0.3-35.el7.tuxcare.els8.x86_64",
            "CentOS-7:libtiff-tools-0:4.0.3-35.el7.tuxcare.els8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-0891",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:libtiff-0:4.0.3-35.el7.tuxcare.els8.i686",
          "CentOS-7:libtiff-0:4.0.3-35.el7.tuxcare.els8.x86_64",
          "CentOS-7:libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.i686",
          "CentOS-7:libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.x86_64",
          "CentOS-7:libtiff-static-0:4.0.3-35.el7.tuxcare.els8.i686",
          "CentOS-7:libtiff-static-0:4.0.3-35.el7.tuxcare.els8.x86_64",
          "CentOS-7:libtiff-tools-0:4.0.3-35.el7.tuxcare.els8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c",
          "url": "https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c"
        },
        {
          "category": "external",
          "summary": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json",
          "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json"
        },
        {
          "category": "external",
          "summary": "https://gitlab.com/libtiff/libtiff/-/issues/380",
          "url": "https://gitlab.com/libtiff/libtiff/-/issues/380"
        },
        {
          "category": "external",
          "summary": "https://gitlab.com/libtiff/libtiff/-/issues/382",
          "url": "https://gitlab.com/libtiff/libtiff/-/issues/382"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/"
        },
        {
          "category": "external",
          "summary": "https://security.gentoo.org/glsa/202210-10",
          "url": "https://security.gentoo.org/glsa/202210-10"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20221228-0008/",
          "url": "https://security.netapp.com/advisory/ntap-20221228-0008/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5108",
          "url": "https://www.debian.org/security/2022/dsa-5108"
        }
      ],
      "release_date": "2022-03-10T17:44:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-16T14:42:06.927478Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776350524",
          "product_ids": [
            "CentOS-7:libtiff-0:4.0.3-35.el7.tuxcare.els8.i686",
            "CentOS-7:libtiff-0:4.0.3-35.el7.tuxcare.els8.x86_64",
            "CentOS-7:libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.i686",
            "CentOS-7:libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.x86_64",
            "CentOS-7:libtiff-static-0:4.0.3-35.el7.tuxcare.els8.i686",
            "CentOS-7:libtiff-static-0:4.0.3-35.el7.tuxcare.els8.x86_64",
            "CentOS-7:libtiff-tools-0:4.0.3-35.el7.tuxcare.els8.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776350524"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:libtiff-0:4.0.3-35.el7.tuxcare.els8.i686",
            "CentOS-7:libtiff-0:4.0.3-35.el7.tuxcare.els8.x86_64",
            "CentOS-7:libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.i686",
            "CentOS-7:libtiff-devel-0:4.0.3-35.el7.tuxcare.els8.x86_64",
            "CentOS-7:libtiff-static-0:4.0.3-35.el7.tuxcare.els8.i686",
            "CentOS-7:libtiff-static-0:4.0.3-35.el7.tuxcare.els8.x86_64",
            "CentOS-7:libtiff-tools-0:4.0.3-35.el7.tuxcare.els8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}