Debian Package Tracker
Register | Log in
Subscribe

tiff

Choose email to subscribe with

general
  • source: tiff (main)
  • version: 4.4.0-2
  • maintainer: Laszlo Boszormenyi (GCS) (DMD)
  • arch: all any
  • std-ver: 4.5.1
  • VCS: unknown
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 4.0.8-2+deb9u5
  • o-o-sec: 4.0.8-2+deb9u8
  • oldstable: 4.1.0+git191117-2~deb10u2
  • old-sec: 4.1.0+git191117-2~deb10u4
  • old-p-u: 4.1.0+git191117-2~deb10u4
  • stable: 4.2.0-1
  • stable-sec: 4.2.0-1+deb11u1
  • stable-p-u: 4.2.0-1+deb11u1
  • testing: 4.4.0-2
  • unstable: 4.4.0-2
versioned links
  • 4.0.8-2+deb9u5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.0.8-2+deb9u8: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.1.0+git191117-2~deb10u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.1.0+git191117-2~deb10u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.2.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.2.0-1+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.4.0-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libtiff-dev
  • libtiff-doc
  • libtiff-opengl (1 bugs: 0, 1, 0, 0)
  • libtiff-tools (12 bugs: 0, 9, 3, 0)
  • libtiff5 (3 bugs: 0, 2, 1, 0)
  • libtiff5-dev
  • libtiffxx5
action needed
14 security issues in stretch high

There are 14 open security issues in stretch.

14 important issues:
  • CVE-2022-0865: Reachable Assertion in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 5e180045.
  • CVE-2022-0891: A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact
  • CVE-2022-0907: Unchecked Return Value to NULL Pointer Dereference in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f2b656e2.
  • CVE-2022-0908: Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.
  • CVE-2022-0909: Divide By Zero error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f8d0f9aa.
  • CVE-2022-0924: Out-of-bounds Read error in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 408976c4.
  • CVE-2022-1210: A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used.
  • CVE-2022-1354:
  • CVE-2022-1355:
  • CVE-2022-1622: LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
  • CVE-2022-1623: LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
  • CVE-2022-2056:
  • CVE-2022-2057:
  • CVE-2022-2058:
Created: 2022-03-07 Last update: 2022-07-01 09:30
4 security issues in sid high

There are 4 open security issues in sid.

4 important issues:
  • CVE-2022-1210: A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used.
  • CVE-2022-2056:
  • CVE-2022-2057:
  • CVE-2022-2058:
Created: 2022-04-03 Last update: 2022-07-01 09:30
4 security issues in bookworm high

There are 4 open security issues in bookworm.

4 important issues:
  • CVE-2022-1210: A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used.
  • CVE-2022-2056:
  • CVE-2022-2057:
  • CVE-2022-2058:
Created: 2022-04-03 Last update: 2022-07-01 09:30
8 low-priority security issues in buster low

There are 8 open security issues in buster.

8 issues left for the package maintainer to handle:
  • CVE-2022-1210: (needs triaging) A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used.
  • CVE-2022-1354: (needs triaging)
  • CVE-2022-1355: (needs triaging)
  • CVE-2022-1622: (needs triaging) LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
  • CVE-2022-1623: (needs triaging) LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
  • CVE-2022-2056: (needs triaging)
  • CVE-2022-2057: (needs triaging)
  • CVE-2022-2058: (needs triaging)

You can find information about how to handle these issues in the security team's documentation.

Created: 2022-04-03 Last update: 2022-07-01 09:30
8 low-priority security issues in bullseye low

There are 8 open security issues in bullseye.

8 issues left for the package maintainer to handle:
  • CVE-2022-1210: (needs triaging) A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used.
  • CVE-2022-1354: (needs triaging)
  • CVE-2022-1355: (needs triaging)
  • CVE-2022-1622: (needs triaging) LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
  • CVE-2022-1623: (needs triaging) LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
  • CVE-2022-2056: (needs triaging)
  • CVE-2022-2057: (needs triaging)
  • CVE-2022-2058: (needs triaging)

You can find information about how to handle these issues in the security team's documentation.

Created: 2022-04-03 Last update: 2022-07-01 09:30
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2018-11-20 Last update: 2018-11-20 12:11
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.5.1).
Created: 2021-08-18 Last update: 2022-05-31 02:30
news
[rss feed]
  • [2022-06-05] tiff 4.4.0-2 MIGRATED to testing (Debian testing watch)
  • [2022-05-30] Accepted tiff 4.4.0-2 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-05-29] Accepted tiff 4.4.0-1 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-05-27] tiff 4.4.0~rc1-1 MIGRATED to testing (Debian testing watch)
  • [2022-05-22] tiff 4.3.0-8 MIGRATED to testing (Debian testing watch)
  • [2022-05-21] Accepted tiff 4.4.0~rc1-1 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-05-17] Accepted tiff 4.3.0-8 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-04-28] tiff 4.3.0-7 MIGRATED to testing (Debian testing watch)
  • [2022-04-25] Accepted tiff 4.3.0-7 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-03-27] Accepted tiff 4.1.0+git191117-2~deb10u4 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2022-03-27] Accepted tiff 4.2.0-1+deb11u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2022-03-24] Accepted tiff 4.1.0+git191117-2~deb10u4 (source) into oldstable->embargoed, oldstable (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2022-03-24] Accepted tiff 4.2.0-1+deb11u1 (source) into stable-security->embargoed, stable-security (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2022-03-16] tiff 4.3.0-6 MIGRATED to testing (Debian testing watch)
  • [2022-03-13] Accepted tiff 4.3.0-6 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-03-07] Accepted tiff 4.3.0-5 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-03-06] Accepted tiff 4.0.8-2+deb9u8 (source all amd64) into oldoldstable (Thorsten Alteholz)
  • [2022-02-15] tiff 4.3.0-4 MIGRATED to testing (Debian testing watch)
  • [2022-02-12] Accepted tiff 4.3.0-4 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-01-29] tiff 4.3.0-3 MIGRATED to testing (Debian testing watch)
  • [2022-01-26] Accepted tiff 4.3.0-3 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2021-11-06] Accepted tiff 4.1.0+git191117-2~deb10u3 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2021-10-31] Accepted tiff 4.1.0+git191117-2~deb10u3 (source) into oldstable->embargoed, oldstable (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2021-10-07] tiff 4.3.0-2 MIGRATED to testing (Debian testing watch)
  • [2021-10-02] Accepted tiff 4.0.8-2+deb9u7 (source) into oldoldstable (Utkarsh Gupta)
  • [2021-09-05] Accepted tiff 4.3.0-2 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2021-06-27] Accepted tiff 4.0.8-2+deb9u6 (source all amd64) into oldstable (Thorsten Alteholz)
  • [2021-06-01] Accepted tiff 4.3.0-1 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2021-03-13] Accepted tiff 4.1.0+git191117-2~deb10u2 (source amd64 all) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2021-03-12] Accepted tiff 4.1.0+git191117-2~deb10u2 (source amd64 all) into stable->embargoed, stable (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • 1
  • 2
bugs [bug history graph]
  • all: 19
  • RC: 0
  • I&N: 14
  • M&W: 4
  • F&P: 1
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 4.4.0~rc1-1
  • 26 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing