#16589 closed enhancement (fixed)
tiff-4.4.0
Reported by: | Bruce Dubbs | Owned by: | Bruce Dubbs |
---|---|---|---|
Priority: | elevated | Milestone: | 11.2 |
Component: | BOOK | Version: | git |
Severity: | normal | Keywords: | |
Cc: |
Description ¶
New minor version.
Change History (4)
comment:1 by , 3 years ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
comment:2 by , 3 years ago
comment:3 by , 3 years ago
Resolution: | → fixed |
---|---|
Status: | assigned → closed |
Fixed at commits
e1be4fda9d Update to gnutls-3.7.6. 002e7bd37c Update to tiff-4.4.0. 1ff5a0d8f1 Update to iw-5.19.
comment:4 by , 3 years ago
Priority: | normal → elevated |
---|
Retroactively promote to Elevated.
CVEs are:
A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service. CVE-2022-1355, LOW
A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service. CVE-2022-1354, MEDIUM
Unfortunately there's a lot of security issues fixed in the next version. Maybe we should port those back in the future, although upstream does seem to be very responsive.
From changelog: