Several buffer overflow, divide by zero or out of bounds read/write vulnerabilities were discovered in tiff, the Tag Image File Format (TIFF) library and tools, which may cause denial of service when processing a crafted TIFF image. For the stable distribution (bullseye), these problems have been fixed in version 4.2.0-1+deb11u3. We recommend that you upgrade your tiff packages. For the detailed security status of tiff please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tiff
Several buffer overflow, divide by zero or out of bounds read/write vulnerabilities were discovered in tiff, the Tag Image File Format (TIFF) library and tools, which may cause denial of service when processing a crafted TIFF image.
For the stable distribution (bullseye), these problems have been fixed in version 4.2.0-1+deb11u3.
We recommend that you upgrade your tiff packages.
For the detailed security status of tiff please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tiff