Debian Package Tracker
Register | Log in
Subscribe

tiff

Choose email to subscribe with

general
  • source: tiff (main)
  • version: 4.7.1-1
  • maintainer: Laszlo Boszormenyi (GCS) (DMD)
  • arch: all any
  • std-ver: 4.7.2
  • VCS: unknown
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 4.2.0-1+deb11u5
  • o-o-sec: 4.2.0-1+deb11u7
  • oldstable: 4.5.0-6+deb12u3
  • old-sec: 4.5.0-6+deb12u3
  • stable: 4.7.0-3+deb13u1
  • stable-sec: 4.7.0-3+deb13u1
  • testing: 4.7.1-1
  • unstable: 4.7.1-1
versioned links
  • 4.2.0-1+deb11u5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.2.0-1+deb11u7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.5.0-6+deb12u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.7.0-3+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.7.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libtiff-dev (1 bugs: 0, 0, 1, 0)
  • libtiff-doc
  • libtiff-opengl (1 bugs: 0, 1, 0, 0)
  • libtiff-tools (16 bugs: 0, 13, 3, 0)
  • libtiff5-dev (1 bugs: 0, 1, 0, 0)
  • libtiff6
  • libtiffxx6
action needed
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2026-4775: A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.
Created: 2026-03-24 Last update: 2026-03-25 05:00
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2026-4775: A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.
Created: 2026-03-24 Last update: 2026-03-25 05:00
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-4775: A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.
Created: 2026-03-24 Last update: 2026-03-25 05:00
4 security issues in bullseye high

There are 4 open security issues in bullseye.

1 important issue:
  • CVE-2026-4775: A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.
1 issue postponed or untriaged:
  • CVE-2022-40090: (needs triaging) An issue was discovered in function TIFFReadDirectory libtiff before 4.4.0 allows attackers to cause a denial of service via crafted TIFF file.
2 ignored issues:
  • CVE-2023-6277: An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB.
  • CVE-2023-52355: An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.
Created: 2026-03-24 Last update: 2026-03-25 05:00
4 security issues in bookworm high

There are 4 open security issues in bookworm.

1 important issue:
  • CVE-2026-4775: A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.
1 issue left for the package maintainer to handle:
  • CVE-2024-13978: (needs triaging) A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as problematic. Affected by this vulnerability is the function t2p_read_tiff_init of the file tools/tiff2pdf.c of the component fax2ps. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The patch is named 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4. It is recommended to apply a patch to fix this issue.

You can find information about how to handle this issue in the security team's documentation.

2 ignored issues:
  • CVE-2023-6277: An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB.
  • CVE-2023-52355: An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.
Created: 2023-06-20 Last update: 2026-03-25 05:00
3 bugs tagged patch in the BTS normal
The BTS contains patches fixing 3 bugs, consider including or untagging them.
Created: 2026-03-31 Last update: 2026-04-01 04:17
lintian reports 19 warnings normal
Lintian reports 19 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-09-22 Last update: 2025-12-27 06:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.2).
Created: 2025-12-23 Last update: 2026-03-31 15:01
news
[rss feed]
  • [2025-10-19] Accepted tiff 4.5.0-6+deb12u3 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2025-10-13] Accepted tiff 4.7.0-3+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2025-10-10] Accepted tiff 4.7.0-3+deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2025-10-10] Accepted tiff 4.5.0-6+deb12u3 (source) into oldstable-security (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2025-09-29] Accepted tiff 4.2.0-1+deb11u7 (source) into oldoldstable-security (Jochen Sprickerhof)
  • [2025-09-26] tiff 4.7.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-09-21] Accepted tiff 4.7.1-1 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2025-09-14] tiff 4.7.0-5 MIGRATED to testing (Debian testing watch)
  • [2025-09-10] Accepted tiff 4.7.0-5 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2025-08-26] tiff 4.7.0-4 MIGRATED to testing (Debian testing watch)
  • [2025-08-24] Accepted tiff 4.7.0-4 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2025-04-10] tiff 4.7.0-3 MIGRATED to testing (Debian testing watch)
  • [2025-04-05] Accepted tiff 4.7.0-3 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2025-04-02] tiff 4.7.0-2 MIGRATED to testing (Debian testing watch)
  • [2025-03-28] Accepted tiff 4.7.0-2 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2025-03-27] Accepted tiff 4.7.0-1 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2025-01-20] Accepted tiff 4.2.0-1+deb11u6 (source) into oldstable-security (Adrian Bunk)
  • [2025-01-03] Accepted tiff 4.5.0-6+deb12u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2024-08-18] tiff 4.5.1+git230720-5 MIGRATED to testing (Debian testing watch)
  • [2024-08-15] Accepted tiff 4.5.1+git230720-5 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2024-03-11] Accepted tiff 4.1.0+git191117-2~deb10u9 (source) into oldoldstable (Abhijith PA)
  • [2024-01-31] tiff 4.5.1+git230720-4 MIGRATED to testing (Debian testing watch)
  • [2024-01-27] Accepted tiff 4.5.1+git230720-4 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2023-12-13] Accepted tiff 4.2.0-1+deb11u5 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Aron Xu)
  • [2023-12-10] tiff 4.5.1+git230720-3 MIGRATED to testing (Debian testing watch)
  • [2023-12-03] Accepted tiff 4.5.1+git230720-3 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2023-11-29] Accepted tiff 4.5.0-6+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Aron Xu)
  • [2023-11-27] Accepted tiff 4.5.0-6+deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Aron Xu)
  • [2023-11-27] Accepted tiff 4.2.0-1+deb11u5 (source) into oldstable-security (Debian FTP Masters) (signed by: Aron Xu)
  • [2023-11-26] Accepted tiff 4.6.0-2 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • 1
  • 2
bugs [bug history graph]
  • all: 29
  • RC: 0
  • I&N: 22
  • M&W: 6
  • F&P: 1
  • patch: 3
links
  • homepage
  • lintian (0, 19)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 4.7.0-3ubuntu4
  • 26 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing