Source: tiff Version: 4.0.7-4 Severity: important Tags: security patch upstream
Hi, the following vulnerability was published for tiff. CVE-2017-5225[0]: | LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the | tools/tiffcp resulting in DoS or code execution via a crafted | BitsPerSample value. For 4.0.7, reproducible with an ASAN build and the reproducers given in the upstream bug reports [1], [2]. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-5225 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225 [1] http://bugzilla.maptools.org/show_bug.cgi?id=2656 [2] http://bugzilla.maptools.org/show_bug.cgi?id=2657 Please adjust the affected versions in the BTS as needed. Only found time to check 4.0.7 source. Regards, Salvatore