Package: tiff
Version: 4.0.2-6
Severity: important
Tags: security

Hi,

many vulnerabilities have been reported against libtiff and a few of them
have been dismissed on the upstream side by simply dropping some of the
tools shipped in libtiff-tools.

Until 4.0.7 is available, we should do the same in Debian. The vulnerabilities
below are about bmp2tiff that has been dropped. But if you look up at the full
list of vulnerabilities you will find other about tools dropped (I noticed
"thumbnail" in CVE-2016-3633).

https://security-tracker.debian.org/tracker/source-package/tiff

CVE-2016-5319[0]:
libtiff: PackBitsEncode heap buffer overflow

CVE-2015-8668[1]:
| Heap-based buffer overflow in the PackBitsPreEncode function in
| tif_packbits.c in bmp2tiff in libtiff 4.0.6 and earlier allows remote
| attackers to execute arbitrary code or cause a denial of service via a
| large width field in a BMP image.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-5319
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5319
[1] https://security-tracker.debian.org/tracker/CVE-2015-8668
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8668
Please adjust the affected versions in the BTS as needed.

Cheers,
-- 
Raphaël Hertzog ◈ Debian Developer

Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/

Reply via email to