Discover Government News


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5333-1                   security@debian.org
https://www.debian.org/security/                                  Aron Xu
January 29, 2023                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : tiff
CVE ID         : CVE-2022-1354 CVE-2022-1355 CVE-2022-1622 CVE-2022-1623 
                 CVE-2022-2056 CVE-2022-2057 CVE-2022-2058 CVE-2022-2519 
                 CVE-2022-2520 CVE-2022-2521 CVE-2022-2867 CVE-2022-2868 
                 CVE-2022-2869 CVE-2022-2953 CVE-2022-3570 CVE-2022-3597 
                 CVE-2022-3599 CVE-2022-3627 CVE-2022-3636 CVE-2022-34526
                 CVE-2022-48281
Debian Bug     : 1011160 1014494 1022555 1024737 1029653

Several buffer overflow, divide by zero or out of bounds read/write
vulnerabilities were discovered in tiff, the Tag Image File Format (TIFF)
library and tools, which may cause denial of service when processing a
crafted TIFF image.

For the stable distribution (bullseye), these problems have been fixed in
version 4.2.0-1+deb11u3.

We recommend that you upgrade your tiff packages.

For the detailed security status of tiff please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/tiff

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-5333-1: tiff security update

January 29, 2023
Several buffer overflow, divide by zero or out of bounds read/write vulnerabilities were discovered in tiff, the Tag Image File Format (TIFF) library and tools, which may cause den...

Summary

For the stable distribution (bullseye), these problems have been fixed in
version 4.2.0-1+deb11u3.

We recommend that you upgrade your tiff packages.

For the detailed security status of tiff please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/tiff

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Severity
Several buffer overflow, divide by zero or out of bounds read/write
vulnerabilities were discovered in tiff, the Tag Image File Format (TIFF)
library and tools, which may cause denial of service when processing a
crafted TIFF image.

Related News