Package "libtiff5-dev"
Name: |
libtiff5-dev
|
Description: |
Tag Image File Format library (TIFF), development files (transitional package)
|
Latest version: |
4.5.0-5ubuntu1.2 |
Release: |
lunar (23.04) |
Level: |
updates |
Repository: |
main |
Head package: |
tiff |
Homepage: |
https://libtiff.gitlab.io/libtiff/ |
Links
Download "libtiff5-dev"
Other versions of "libtiff5-dev" in Lunar
Changelog
tiff (4.5.0-5ubuntu1.2) lunar-security; urgency=medium
* SECURITY UPDATE: out-of-bound read
- debian/patches/CVE-2023-1916.patch: Fix heap-buffer-overflow in
function extractImageSection
- CVE-2023-1916
-- Nishit Majithia <email address hidden> Tue, 10 Oct 2023 15:54:39 +0530
|
Source diff to previous version |
CVE-2023-1916 |
A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the ex |
|
tiff (4.5.0-5ubuntu1.1) lunar-security; urgency=medium
* SECURITY UPDATE: NULL pointer dereference
- debian/patches/CVE-2023-2731.patch: avoid crash when trying to read again
from a strip with a missing end-of-information marker in tif_lzw.c.
- CVE-2023-2731
* SECURITY UPDATE: NULL pointer dereference
- d/p/0001-countInkNamesString-fix-UndefinedBehaviorSanitizer-a.patch: Fix
undefined behavior in tif_dir.c.
- CVE-2023-2908
* SECURITY UPDATE: buffer overflow
- d/p/0003-Consider-error-return-of-writeSelections.patch: Consider error
return of writeSelections() in tiffcrop.c.
- CVE-2023-3618
* SECURITY UPDATE: heap-based buffer overflow
- d/p/0004-tiffcrop-correctly-update-buffersize-after-rotateIma.patch:
correctly update buffersize after rotateImage() and enlarge buffsize and
check integer overflow within rotateImage() in tiffcrop.c.
- CVE-2023-25433
* SECURITY UPDATE: Use after free
- d/p/0005-tiffcrop-Do-not-reuse-input-buffer-for-subsequent-im.patch: Do
not reuse input buffer for subsequent images in tiffcrop.c.
- CVE-2023-26965
* SECURITY UPDATE: buffer overflow
- d/p/0006-tif_luv-Check-and-correct-for-NaN-data-in-uv_encode.patch: Check
and correct for NaN data in uv_encode() in tif_luv.c.
- CVE-2023-26966
* SECURITY UPDATE: Integer overflow
- d/p/0007-tiffcp-fix-memory-corruption-overflow-on-hostile-ima.patch: fix
memory corruption (overflow) in tiffcp.c.
- CVE-2023-38288
* SECURITY UPDATE: Integer overflow
- d/p/0008-raw2tiff-fix-integer-overflow-and-bypass-of-the-chec.patch: fix
integer overflow and bypass of the check in raw2tiff.c.
- CVE-2023-38289
-- Fabian Toepfer <email address hidden> Mon, 07 Aug 2023 19:51:46 +0200
|
CVE-2023-2731 |
A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft |
CVE-2023-2908 |
A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tif |
CVE-2023-3618 |
A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in li |
CVE-2023-25433 |
libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop |
CVE-2023-26965 |
loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image. |
CVE-2023-26966 |
libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be b |
CVE-2023-38288 |
libtiff: integer overflow in tiffcp.c |
CVE-2023-38289 |
libtiff: potential integer overflow in raw2tiff.c |
|
About
-
Send Feedback to @ubuntu_updates