Source: tiff
Version: 4.0.9-1
Severity: important
Tags: patch security upstream
Forwarded: http://bugzilla.maptools.org/show_bug.cgi?id=2772

Hi,

the following vulnerability was published for tiff.

CVE-2018-5784[0]:
| In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the
| TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage
| this vulnerability to cause a denial of service via a crafted tif file.
| This occurs because the declared number of directory entries is not
| validated against the actual number of directory entries.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-5784
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5784
[1] http://bugzilla.maptools.org/show_bug.cgi?id=2772
[2] 
https://gitlab.com/libtiff/libtiff/commit/473851d211cf8805a161820337ca74cc9615d6ef

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

_______________________________________________
Secure-testing-team mailing list
Secure-testing-team@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

Reply via email to