- ------------------------------------------------------------------------- Debian LTS Advisory DLA-3513-1 [email protected] https://www.debian.org/lts/security/ Adrian Bunk July 31, 2023 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : tiff Version : 4.1.0+git191117-2~deb10u8 CVE ID : CVE-2023-2908 CVE-2023-3316 CVE-2023-3618 CVE-2023-25433 CVE-2023-26965 CVE-2023-26966 CVE-2023-38288 CVE-2023-38289 Debian Bug : 1040945 Multiple vulnerabilities were found in tiff, a library and tools providing support for the Tag Image File Format (TIFF). CVE-2023-2908 NULL pointer dereference in tif_dir.c CVE-2023-3316 NULL pointer dereference in TIFFClose() CVE-2023-3618 Buffer overflow in tiffcrop CVE-2023-25433 Buffer overflow in tiffcrop CVE-2023-26965 Use after free in tiffcrop CVE-2023-26966 Buffer overflow in uv_encode() CVE-2023-38288 Integer overflow in tiffcp CVE-2023-38289 Integer overflow in raw2tiff For Debian 10 buster, these problems have been fixed in version 4.1.0+git191117-2~deb10u8. We recommend that you upgrade your tiff packages. For the detailed security status of tiff please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tiff Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS