Hi László,

On Wed, Jul 12, 2023 at 10:12:50PM +0200, László Böszörményi wrote:
> Hi Salvatore,
> 
> On Wed, Jul 12, 2023 at 9:39 PM Salvatore Bonaccorso <car...@debian.org> 
> wrote:
> > Source: tiff
> > Version: 4.5.1-1
> > CVE-2023-3618[0]:
> > | A flaw was found in libtiff. A specially crafted tiff file can lead
> > | to a segmentation fault due to a buffer overflow in the Fax3Encode
> > | function in libtiff/tif_fax3.c, resulting in a denial of service.
> [...]
> > Please adjust the affected versions in the BTS as needed.
>  Done my quick testing. My experience is the following.
> 1) libtiff6 and libtiff-tools are both 4.5.1-1 (ie, Trixie): the tool
> reports several warnings, exists with 1 (non-zero) but doesn't
> segfault. Even tried with valgrind, still no segfault.
> 2) libtiff6 is 4.5.1-1 backported to Bookworm and libtiff-tools are
> not, ie it's 4.5.0-6 : the tool reports the same warnings like above,
> but this time it _does_ segfault.
> 3) If libtiff-tools also updated to 4.5.1-1 on Bookworm: it's like the
> first case, several warnings, non-zero exit code without a segfault.
> 
> In short, it seems:
> - it's a non-dsa as only a crash in a CLI tool (which has end of life now),
> - doesn't affect the library,
> - while 4.5.0-6 (and in fact, at least from 4.5.0-1) is vulnerable,
> 4.5.1-1 fixed this issue.
> 
> But you may find it otherwise, I do not alter this report in the BTS.

Thanks for coming back that quickly, impressive :).

I do completely agree, it's a no-dsa issue similar to the others, was
done already.

For about having the issue fixed: The problem I have is that upstream
has not yet closed the issue. Is it completely fixed and what is the
fixing commit? https://gitlab.com/libtiff/libtiff/-/issues/529 is
slight unhelpful on that front.

Are you able to identify the fixing commit confirming it is done in
4.5.1-1?

Regards,
Salvatore

Reply via email to