Lucene search

K
debianDebianDEBIAN:DSA-5333-1:E9E78
HistoryJan 29, 2023 - 12:55 p.m.

[SECURITY] [DSA 5333-1] tiff security update

2023-01-2912:55:02
lists.debian.org
59
tiff
buffer overflow
denial of service
debian
security update
cve-2022-1354
cve-2022-1355
cve-2022-1622
cve-2022-1623
cve-2022-2056
cve-2022-2057
cve-2022-2058
cve-2022-2519
cve-2022-2520
cve-2022-2521
cve-2022-2867
cve-2022-2868
cve-2022-2869
cve-2022-2953
cve-2022-3570
cve-2022-3597
cve-2022-3599
cve-2022-3627
cve-2022-3636
cve-2022-34526
cve-2022-48281
debian bug 1011160
debian bug 1014494
debian bug 1022555
debian bug 1024737
debian bug 1029653
security tracker
tiff library
unix

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.006

Percentile

78.6%


Debian Security Advisory DSA-5333-1 [email protected]
https://www.debian.org/security/ Aron Xu
January 29, 2023 https://www.debian.org/security/faq


Package : tiff
CVE ID : CVE-2022-1354 CVE-2022-1355 CVE-2022-1622 CVE-2022-1623
CVE-2022-2056 CVE-2022-2057 CVE-2022-2058 CVE-2022-2519
CVE-2022-2520 CVE-2022-2521 CVE-2022-2867 CVE-2022-2868
CVE-2022-2869 CVE-2022-2953 CVE-2022-3570 CVE-2022-3597
CVE-2022-3599 CVE-2022-3627 CVE-2022-3636 CVE-2022-34526
CVE-2022-48281
Debian Bug : 1011160 1014494 1022555 1024737 1029653

Several buffer overflow, divide by zero or out of bounds read/write
vulnerabilities were discovered in tiff, the Tag Image File Format (TIFF)
library and tools, which may cause denial of service when processing a
crafted TIFF image.

For the stable distribution (bullseye), these problems have been fixed in
version 4.2.0-1+deb11u3.

We recommend that you upgrade your tiff packages.

For the detailed security status of tiff please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/tiff

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.006

Percentile

78.6%