Debian Package Tracker
Register | Log in
Subscribe

tiff

Choose email to subscribe with

general
  • source: tiff (main)
  • version: 4.4.0-4
  • maintainer: Laszlo Boszormenyi (GCS) (DMD)
  • arch: all any
  • std-ver: 4.5.1
  • VCS: unknown
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 4.0.8-2+deb9u5
  • o-o-sec: 4.0.8-2+deb9u8
  • oldstable: 4.1.0+git191117-2~deb10u2
  • old-sec: 4.1.0+git191117-2~deb10u4
  • old-p-u: 4.1.0+git191117-2~deb10u4
  • stable: 4.2.0-1+deb11u1
  • stable-sec: 4.2.0-1+deb11u1
  • testing: 4.4.0-4
  • unstable: 4.4.0-4
versioned links
  • 4.0.8-2+deb9u5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.0.8-2+deb9u8: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.1.0+git191117-2~deb10u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.1.0+git191117-2~deb10u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.2.0-1+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.4.0-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libtiff-dev (1 bugs: 0, 0, 1, 0)
  • libtiff-doc
  • libtiff-opengl (1 bugs: 0, 1, 0, 0)
  • libtiff-tools (12 bugs: 0, 9, 3, 0)
  • libtiff5 (3 bugs: 0, 2, 1, 0)
  • libtiff5-dev
  • libtiffxx5
action needed
8 security issues in buster high

There are 8 open security issues in buster.

1 important issue:
  • CVE-2022-34526: A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file.
7 issues postponed or untriaged:
  • CVE-2022-1354: (needs triaging)
  • CVE-2022-1355: (needs triaging)
  • CVE-2022-1622: (needs triaging) LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
  • CVE-2022-1623: (needs triaging) LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
  • CVE-2022-2056: (needs triaging) Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
  • CVE-2022-2057: (needs triaging) Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
  • CVE-2022-2058: (needs triaging) Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
Created: 2022-07-04 Last update: 2022-08-11 22:35
lintian reports 4 warnings normal
Lintian reports 4 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2022-08-07 Last update: 2022-08-07 04:37
8 low-priority security issues in bullseye low

There are 8 open security issues in bullseye.

8 issues left for the package maintainer to handle:
  • CVE-2022-1354: (needs triaging)
  • CVE-2022-1355: (needs triaging)
  • CVE-2022-1622: (needs triaging) LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
  • CVE-2022-1623: (needs triaging) LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
  • CVE-2022-2056: (needs triaging) Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
  • CVE-2022-2057: (needs triaging) Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
  • CVE-2022-2058: (needs triaging) Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
  • CVE-2022-34526: (needs triaging) A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file.

You can find information about how to handle these issues in the security team's documentation.

Created: 2022-07-04 Last update: 2022-08-11 22:35
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2018-11-20 Last update: 2018-11-20 12:11
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.5.1).
Created: 2021-08-18 Last update: 2022-08-07 00:13
news
[rss feed]
  • [2022-08-09] tiff 4.4.0-4 MIGRATED to testing (Debian testing watch)
  • [2022-08-06] Accepted tiff 4.4.0-4 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-07-13] tiff 4.4.0-3 MIGRATED to testing (Debian testing watch)
  • [2022-07-08] Accepted tiff 4.4.0-3 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-06-05] tiff 4.4.0-2 MIGRATED to testing (Debian testing watch)
  • [2022-05-30] Accepted tiff 4.4.0-2 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-05-29] Accepted tiff 4.4.0-1 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-05-27] tiff 4.4.0~rc1-1 MIGRATED to testing (Debian testing watch)
  • [2022-05-22] tiff 4.3.0-8 MIGRATED to testing (Debian testing watch)
  • [2022-05-21] Accepted tiff 4.4.0~rc1-1 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-05-17] Accepted tiff 4.3.0-8 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-04-28] tiff 4.3.0-7 MIGRATED to testing (Debian testing watch)
  • [2022-04-25] Accepted tiff 4.3.0-7 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-03-27] Accepted tiff 4.1.0+git191117-2~deb10u4 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2022-03-27] Accepted tiff 4.2.0-1+deb11u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2022-03-24] Accepted tiff 4.1.0+git191117-2~deb10u4 (source) into oldstable->embargoed, oldstable (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2022-03-24] Accepted tiff 4.2.0-1+deb11u1 (source) into stable-security->embargoed, stable-security (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2022-03-16] tiff 4.3.0-6 MIGRATED to testing (Debian testing watch)
  • [2022-03-13] Accepted tiff 4.3.0-6 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-03-07] Accepted tiff 4.3.0-5 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-03-06] Accepted tiff 4.0.8-2+deb9u8 (source all amd64) into oldoldstable (Thorsten Alteholz)
  • [2022-02-15] tiff 4.3.0-4 MIGRATED to testing (Debian testing watch)
  • [2022-02-12] Accepted tiff 4.3.0-4 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-01-29] tiff 4.3.0-3 MIGRATED to testing (Debian testing watch)
  • [2022-01-26] Accepted tiff 4.3.0-3 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2021-11-06] Accepted tiff 4.1.0+git191117-2~deb10u3 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2021-10-31] Accepted tiff 4.1.0+git191117-2~deb10u3 (source) into oldstable->embargoed, oldstable (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2021-10-07] tiff 4.3.0-2 MIGRATED to testing (Debian testing watch)
  • [2021-10-02] Accepted tiff 4.0.8-2+deb9u7 (source) into oldoldstable (Utkarsh Gupta)
  • [2021-09-05] Accepted tiff 4.3.0-2 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • 1
  • 2
bugs [bug history graph]
  • all: 20
  • RC: 0
  • I&N: 14
  • M&W: 5
  • F&P: 1
  • patch: 0
links
  • homepage
  • lintian (0, 4)
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 4.4.0~rc1-1
  • 27 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing