tiff 4.3.0-6 source package in Debian

Changelog

tiff (4.3.0-6) unstable; urgency=high

  * Backport security fix for CVE-2022-0908, null source pointer passed as an
    argument to memcpy() function within TIFFFetchNormalTag().
  * Backport security fix for CVE-2022-0907, unchecked return value to null
    pointer dereference in tiffcrop.
  * Backport security fix for CVE-2022-0909, divide by zero error in
    tiffcrop.
  * Backport security fix for CVE-2022-0891, heap buffer overflow in
    ExtractImageSection function in tiffcrop.
  * Backport security fix for CVE-2022-0924, heap buffer overflow in tiffcp.

 -- Laszlo Boszormenyi (GCS) <email address hidden>  Sun, 13 Mar 2022 11:00:15 +0100

Upload details

Uploaded by:
Laszlo Boszormenyi
Uploaded to:
Sid
Original maintainer:
Laszlo Boszormenyi
Architectures:
any all
Section:
libs
Urgency:
Very Urgent

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Downloads

File Size SHA-256 Checksum
tiff_4.3.0-6.dsc 2.4 KiB 85bb9336fa1e880ca17159176dee73a2832aa60e131cce2a65b7ab69d87863b8
tiff_4.3.0.orig.tar.gz 2.7 MiB 0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8
tiff_4.3.0.orig.tar.gz.asc 488 bytes 6e41d0a4c042d2903f28534eb696a16409ccde9aaa2d02d06b5daaabbfb94aa7
tiff_4.3.0-6.debian.tar.xz 24.5 KiB 116bb5a0343185ffde46b0b0bde300731c0ebe37b5ae8541992f6556e8e2d408

Available diffs

No changes file available.

Binary packages built by this source