Debian-LTS has issued an advisory on February 21: https://www.debian.org/lts/security/2023/dla-3333 Mageia 8 is also affected.
Whiteboard: (none) => MGA8TOOStatus comment: (none) => Patches available from upstream and Debian
This is for you, Nicolas.
Assignee: bugsquad => nicolas.salguero
Suggested advisory: ======================== The updated packages fix security vulnerabilities: LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via a crafted tiff file. (CVE-2023-0795) LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via a crafted tiff file. (CVE-2023-0796) LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921, allowing attackers to cause a denial-of-service via a crafted tiff file. (CVE-2023-0797) LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via a crafted tiff file. (CVE-2023-0798) LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file. (CVE-2023-0799) LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via a crafted tiff file. (CVE-2023-0800) LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6778, allowing attackers to cause a denial-of-service via a crafted tiff file. (CVE-2023-0801) LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff file. (CVE-2023-0802) LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via a crafted tiff file. (CVE-2023-0803) LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via a crafted tiff file. (CVE-2023-0804) References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0795 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0796 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0797 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0798 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0799 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0800 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0801 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0802 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0803 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0804 https://www.debian.org/lts/security/2023/dla-3333 ======================== Updated packages in core/updates_testing: ======================== lib(64)tiff5-4.2.0-1.14.mga8 lib(64)tiff-devel-4.2.0-1.14.mga8 lib(64)tiff-static-devel-4.2.0-1.14.mga8 libtiff-progs-4.2.0-1.14.mga8 from SRPM: libtiff-4.2.0-1.14.mga8.src.rpm
Status: NEW => ASSIGNEDCC: (none) => nicolas.salgueroStatus comment: Patches available from upstream and Debian => (none)Version: Cauldron => 8Assignee: nicolas.salguero => qa-bugsWhiteboard: MGA8TOO => (none)Source RPM: libtiff-4.5.0-4.mga9.src.rpm => libtiff-4.2.0-1.13.mga8.src.rpm
Debian has issued an advisory for this on February 24: https://www.debian.org/security/2023/dsa-5361
MGA8-64 MATE on Acer Aspire 5253 No installation issues Followed bug 61467 $ tiff2pdf 1973-024.tif > 1973.pdf Generated pdf displays the picture OK. $ tiffinfo 1973-024.tif TIFF Directory at offset 0x2e9da08 (48880136) Subfile Type: (0 = 0x0) Image Width: 2904 Image Length: 4208 Resolution: 3200, 3200 pixels/inch Bits/Sample: 8 Compression Scheme: None Photometric Interpretation: RGB color Extra Samples: 1<assoc-alpha> Orientation: row 0 top, col 0 lhs Samples/Pixel: 4 Rows/Strip: 64 Planar Configuration: single image plane DocumentName: /home/herman/HV/fotos/kleurnegatieven/1973/1973-024.tif ImageDescription: Created with GIMP $ gimp 1973-024.tif Warning: Unknown input_id: -1 for input: surfacemap_x Warning: Unknown input_id: -1 for input: surfacemap_x Warning: Unknown input_id: -1 for input: surfacemap_x Warning: Unknown input_id: -1 for input: surfacemap_x Warning: Unknown input_id: -1 for input: surfacemap_x Warning: Unknown input_id: -1 for input: surfacemap_x Warning: Unknown input_id: -1 for input: surfacemap_x Warning: Unknown input_id: -1 for input: surfacemap_x Warning: Unknown input_id: -1 for input: surfacemap_x Warning: Unknown input_id: -1 for input: surfacemap_x Warning: Unknown input_id: -1 for input: surfacemap_x Warning: Unknown input_id: -1 for input: surfacemap_x bps: 8 Image dimensions: 2904 x 4208. load_contiguous bytes_per_pixel: 4, format: 4 Pïcture displays OK in gimp. OK for me.
CC: (none) => herman.viaeneWhiteboard: (none) => MGA8-64-OK
Validating. Advisory in comment 2.
CC: (none) => andrewsfarm, sysadmin-bugsKeywords: (none) => validated_update
CC: (none) => davidwhodginsKeywords: (none) => advisory
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2023-0080.html
Resolution: (none) => FIXEDStatus: ASSIGNED => RESOLVED