New Debian tiff 4.0.8-2+deb9u8 fixes: This update addresses the following issues: * Denial of Service via crafted TIFF file (CVE-2022-0561) * Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562) * out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
--- mirror/ftp/4.4/unmaintained/component/4.4-8-errata/source/tiff_4.0.8-2+deb9u7.dsc +++ apt/ucs_4.4-0-errata4.4-8/source/tiff_4.0.8-2+deb9u8.dsc @@ -1,3 +1,18 @@ +4.0.8-2+deb9u8 [Sun, 06 Mar 2022 10:03:02 +0100] Thorsten Alteholz <debian@alteholz.de>: + + * Non-maintainer upload by the LTS Team. + * CVE-2022-22844 + out-of-bounds read in _TIFFmemcpy in certain situations involving a + custom tag and 0x0200 as the second word of the DE field. + * CVE-2022-0562 + Null source pointer passed as an argument to memcpy() function within + TIFFReadDirectory(). This could result in a Denial of Service via + crafted TIFF files. + * CVE-2022-0561 + Null source pointer passed as an argument to memcpy() function within + TIFFFetchStripThing(). This could result in a Denial of Service via + crafted TIFF files. + 4.0.8-2+deb9u7 [Sat, 18 Sep 2021 18:41:25 +0530] Utkarsh Gupta <utkarsh@debian.org>: * Non-maintainer upload by the LTS team. <http://piuparts.knut.univention.de/4.4-8/#5459938673791769831>
OK: yaml OK: announce_errata OK: patch OK: piuparts [4.4-8] 91896509ac Bug #54511: tiff 4.0.8-2+deb9u8 doc/errata/staging/tiff.yaml | 17 +++++++++++++++++ 1 file changed, 17 insertions(+)
<https://errata.software-univention.de/#/?erratum=4.4x1189>