Debian alert DLA-3297-1 (tiff)
From: | Utkarsh Gupta <guptautkarsh2102@gmail.com> | |
To: | debian-lts-announce@lists.debian.org | |
Subject: | [SECURITY] [DLA 3297-1] tiff security update | |
Date: | Tue, 31 Jan 2023 03:14:57 +0530 | |
Message-ID: | <CAPP0f962YDKc6UO3e3KQ8-065vkT772S5hAK+-eGvTxxfd8D7g@mail.gmail.com> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ----------------------------------------------------------------------- Debian LTS Advisory DLA-3297-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Utkarsh Gupta January 31, 2023 https://wiki.debian.org/LTS - ----------------------------------------------------------------------- Package : tiff Version : 4.1.0+git191117-2~deb10u6 CVE ID : CVE-2022-48281 Debian Bug : 1029653 processCropSelections in tools/tiffcrop.c in LibTIFF, the Tag Image File Format (TIFF) library and tools, has a heap-based buffer overflow (e.g., "WRITE of size 307203") via a crafted TIFF image. For Debian 10 buster, this problem has been fixed in version 4.1.0+git191117-2~deb10u6. We recommend that you upgrade your tiff packages. For the detailed security status of tiff please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tiff Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAmPYOjAACgkQgj6WdgbD S5bCqw//QDkpulCYSy+x3VAiL9evDu7SYgO6zqE6JovBoMCN2O7BbF4dB5XWr3CA bm5RoamXc6OD3vycXCUWWw4bbi3k7jFoG7UZV6UCvKabbZqqP9Qwi1cxRGpgGN42 PRlrepuDZKsbMVnhmhESGUsd90d3m54dLxEBfRHLcUsog6hctp5AeYmA9lgrKS6Y TSTp3Ngq4yXnUUj3FQaoyDQJyHcm9EZUQlV9sizRr1tZYBA5ogNb1pYrXbzyqwbn Td/BSKujUpbP/GftaroIKobAVnUTWcL32QcWA0Hg4yMegSR5jJ+rdPJ/w3wsxbol 4YPnNLMqe4Ngzq48kUCaqLDoNiZyvzI3ladXTh8LzpDRbykI0zLAvfPmP8qx46iP i/NbtEggKZISrorD94Mjkg2EyaOPa8puQMH+klJj36P1OHgIDkGEbg/FUw3otCAc S3HCxtPtJbYVSLScNeHEUXY7nGQvFLGopf9EGiJnaqRlGPCk5ljZXUpp9gUoiezg lQQazEmaUn5dbxT0gNJ25bJ+/6Hkk8zikvDq9scu88iQ4tefedoDTq11rHqYquNF 7h3AnowNUOgaB9k32aTrJ9QFk/ZrZG9k7glCqDj0ixtDkyDtqIksVc22MfqAQYUs xhLdy04qewUAbSWws7quN0NFLvOK5/vCw+RN/WSRwhraJ71C6x4= =u66I -----END PGP SIGNATURE-----