A heap-based buffer overflow flaw was found in libtiff in the handling of TIFF images in libtiff’s TIFF2PDF tool. A specially crafted TIFF file can lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
[
{
"product": "libtiff",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "libtiff 4.2.0"
}
]
}
]
bugzilla.redhat.com/show_bug.cgi?id=1932044
gitlab.com/libtiff/libtiff/-/merge_requests/159
gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22
lists.debian.org/debian-lts-announce/2021/06/msg00023.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
security.gentoo.org/glsa/202104-06
security.netapp.com/advisory/ntap-20210521-0009/
www.debian.org/security/2021/dsa-4869