Source: tiff Version: 4.0.9-1 Severity: important Tags: patch security upstream Forwarded: http://bugzilla.maptools.org/show_bug.cgi?id=2772
Hi, the following vulnerability was published for tiff. CVE-2018-5784[0]: | In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the | TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage | this vulnerability to cause a denial of service via a crafted tif file. | This occurs because the declared number of directory entries is not | validated against the actual number of directory entries. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-5784 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5784 [1] http://bugzilla.maptools.org/show_bug.cgi?id=2772 [2] https://gitlab.com/libtiff/libtiff/commit/473851d211cf8805a161820337ca74cc9615d6ef Please adjust the affected versions in the BTS as needed. Regards, Salvatore _______________________________________________ Secure-testing-team mailing list Secure-testing-team@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team