|
|
Subscribe / Log in / New account

Debian alert DLA-3513-1 (tiff)

From:  Adrian Bunk <bunk@debian.org>
To:  debian-lts-announce@lists.debian.org
Subject:  [SECURITY] [DLA 3513-1] tiff security update
Date:  Mon, 31 Jul 2023 23:56:20 +0000
Message-ID:  <ZMhKJKxZFUd888sD@localhost>

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3513-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Adrian Bunk July 31, 2023 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : tiff Version : 4.1.0+git191117-2~deb10u8 CVE ID : CVE-2023-2908 CVE-2023-3316 CVE-2023-3618 CVE-2023-25433 CVE-2023-26965 CVE-2023-26966 CVE-2023-38288 CVE-2023-38289 Debian Bug : 1040945 Multiple vulnerabilities were found in tiff, a library and tools providing support for the Tag Image File Format (TIFF). CVE-2023-2908 NULL pointer dereference in tif_dir.c CVE-2023-3316 NULL pointer dereference in TIFFClose() CVE-2023-3618 Buffer overflow in tiffcrop CVE-2023-25433 Buffer overflow in tiffcrop CVE-2023-26965 Use after free in tiffcrop CVE-2023-26966 Buffer overflow in uv_encode() CVE-2023-38288 Integer overflow in tiffcp CVE-2023-38289 Integer overflow in raw2tiff For Debian 10 buster, these problems have been fixed in version 4.1.0+git191117-2~deb10u8. We recommend that you upgrade your tiff packages. For the detailed security status of tiff please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tiff Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmTISiQACgkQiNJCh6LY mLE4oxAAsLoU6HtnZqYIurv0h/+D1aJ1AkSSlp9pfLvJiuPl5nWa5h5E+jYEGkK1 O39SOJNVXoDqixLv4LfCqhyGWffY8NZB+d9fidV5lHml7PwOjsLECAN2to4WJW7m tsCzG0STEwGn9W1kS12zGBKJt8La+h8V4T4ZrCZIW41RzkOhmUhFYIpKCrB1Z0qs Z2wGLR2zBnMBr9RiwGVEHKiogZgOYr0VS0g0pZasDFGR++ra/JZfjotzIxmWTt4v Nkued+JWymGMmieiM93SHPA6BRbWI3fU0bQ4mKXuJppMBy0wDL3DXdu9HG+NlU9T U9WVWLoY5xqUGBaYaMirDcVslPTjYAuTyCiUtHIlkv8EV+6Eafl1CBZnzNPdyGId wuMxCHPQjAScUue3WpYX8hd2xSpgC1M0q+CLUde1sav7v9idOJFNe4jZ656cMcKY 6NS5ZxIwHEj8GnbN15qvkpuvIfsrOfXQhkNr9TLE4iOs2V4bSBWumGK7FsML7uMR HfHtZk1CYojq59yQFNIbV58oqLghsmDuJBgQOEOTnS9Kau0Bbjum5+I/LSlmdweF Qjpv1ARfc5SMoDYSA6/Yl0Zwx0j58hWopK2wDyzY6HQduTCNk4XkRWHROCEaSmiC G2wKf9KsM6lgruHhHNB1r817J5bwNZ42X6ClGvP5Je+WHBJffyY= =GGoQ -----END PGP SIGNATURE-----


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds