Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.3359 tiff security update 11 October 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: tiff Publisher: Debian Operating System: Debian GNU/Linux Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-19144 CVE-2020-19131 Original Bulletin: https://www.debian.org/lts/security/2021/dla-2777 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running tiff check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ----------------------------------------------------------------------- Debian LTS Advisory DLA-2777-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Utkarsh Gupta October 03, 2021 https://wiki.debian.org/LTS - - ----------------------------------------------------------------------- Package : tiff Version : 4.0.8-2+deb9u7 CVE ID : CVE-2020-19131 CVE-2020-19144 Two security issues were found in TIFF, a widely used format for storing image data, as follows: CVE-2020-19131 Buffer Overflow in LibTiff allows attackers to cause a denial of service via the "invertImage()" function in the component "tiffcrop". CVE-2020-19144 Buffer Overflow in LibTiff allows attackers to cause a denial of service via the 'in _TIFFmemcpy' funtion in the component 'tif_unix.c'. For Debian 9 stretch, these problems have been fixed in version 4.0.8-2+deb9u7. We recommend that you upgrade your tiff packages. For the detailed security status of tiff please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tiff Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE1vEOfV7HXWKqBieIDTl9HeUlXjAFAmFh178ACgkQDTl9HeUl XjDiNQ/+Oj6juJ04ey0Crr+s6fd/R1wR7SyF80J7nVTwPT0bU5f/4MB5R+/kIg0v P3FE5wE71gaeQ/yuRRT0DQgUiQoSj4N1LB0TubcB96x4KfAyc2Hm7qp85DRPNfx3 ZIO6wbsgmEb7xwQzoV7Y3fJzRIf+ato5ZxqvUPltENV+oplTOKLce0n7iWj1g2O/ 5B1Yam67fGbE1eO54dgQ0DqdjdEnXMiGNMapd8I3IEEkZY54+pNltKpN9J35lkI1 w51aZ59s+nvjbdkpZ+miHMYrq4xNhCNHPia8Om7SYYVDBC3ABw3KaPu82M2Y7Vex vzuCizJCT31uLEeVO48Pf6dJHzx3aobBt+G9zMVLr2c6QTn46k0OSd5yIy/gvIZu 0P4srk+RGLN9qd0MYVUudmj2B7/wJIYt4NdS4Qb0NyFOKyHQrCQpCOE8tkb4y35z 9uAZJtFIVtEDxXNca/08yF3X4j5Jt4rlyhPWI4JutOWNaYXJ1nQ+6hS4BkZy9O0d TVP59wLeiWhmHtjVQbJXjJK+Ajb15c4FsqxSCfvFM4p3Qz6E9a8iPPXO0y2gn480 8dJeb9oOgMkmeWhaRefTyEzhctCO55oUuOncKLSXBanxPMWszWFWrV56Ig8MxAZJ Hx7IONfyWr/GCmy0AFUY6T7gS/FDPHJHTMRsFI50ogj61bdCELo= =1VJN - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYWOG1uNLKJtyKPYoAQgeOw//dyoSi+KZNd9wKblJQjgAZE8AgTLZ1m0d jArD4Xa8jqcdjZZnHAkTnopc/WfeplXQJSWqGc/YD30Cq55L/8swYw4u0Tjppvan U7YQGjvR5Q7lj3QoXAQFYzwyWqSM/80kNKfgv4oWN9iyfmEBPmh7dmWClE+GX2W+ plJ0uh5H/jfmV4ndSrlfezwIv/x1Okx3A8ODcBA/6kRvyQw9Vpwjb6IyhVUdA/aY 3SiZnfUSgjDSBAfw+nVXjGdLQn7+GVUC+Nq1oW5Mep6VNOhrItv4zPZyG8jNl/xk PAPrnPuELnQXddL/I3IM5oelgwWfb9sUKMcnuRm3L6xA9krMi3MS1mx9QYjov+v0 gbawtu0LhoseIjRCw9d6U96QOY6EzElQep0lT2zQb8AKE/2yg4dfeel7MoEwpYDY ArSa2Be+nrrycXXCjWB6gzYNyiwpy8R/Hl4MZCG4QXjM2qhUUTSGdQmzwcbZ2ZKt u4xvjA62KS17HCSwZHqRUyDuzXkMUVKL90pRYySKrFIsz7b4HHlqOScQKS+EO0LB TeeHSUHpO2QR6zl0HwHX0hvUaP9Bj5Q1ouKX+xhohRht2Sbjl0D4rRHFFmo18ZQO HXxxPt1YGWnlXzLYXCvHZASuIW0EMyqopAsD22KjQmka5RmhZvEn7a/4D4TNMBKi 2GWCggvnCmY= =+qRw -----END PGP SIGNATURE-----