Source: tiff
Version: 4.7.0-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for tiff.

CVE-2024-13978[0]:
| A vulnerability was found in LibTIFF up to 4.7.0. It has been
| declared as problematic. Affected by this vulnerability is the
| function t2p_read_tiff_init of the file tools/tiff2pdf.c of the
| component fax2ps. The manipulation leads to null pointer
| dereference. The attack needs to be approached locally. The
| complexity of an attack is rather high. The exploitation appears to
| be difficult. The patch is named
| 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4. It is recommended to apply
| a patch to fix this issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-13978
    https://www.cve.org/CVERecord?id=CVE-2024-13978
[1] https://gitlab.com/libtiff/libtiff/-/issues/649
[2] https://gitlab.com/libtiff/libtiff/-/issues/650
[3] https://gitlab.com/libtiff/libtiff/-/merge_requests/667
[4] 
https://gitlab.com/libtiff/libtiff/-/commit/7be20ccaab97455f192de0ac561ceda7cd9e12d1
[5] 
https://gitlab.com/libtiff/libtiff/-/commit/2ebfffb0e8836bfb1cd7d85c059cd285c59761a4

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to