| Name | CVE-2023-52356 |
| Description | A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DLA-3758-1, DLA-4026-1 |
| Debian Bugs | 1061524 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| tiff (PTS) | bullseye | 4.2.0-1+deb11u5 | vulnerable |
| bullseye (security) | 4.2.0-1+deb11u7 | fixed | |
| bookworm | 4.5.0-6+deb12u2 | fixed | |
| bookworm (security) | 4.5.0-6+deb12u3 | fixed | |
| trixie | 4.7.0-3 | fixed | |
| trixie (security) | 4.7.0-3+deb13u1 | fixed | |
| forky, sid | 4.7.1-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| tiff | source | buster | 4.1.0+git191117-2~deb10u9 | DLA-3758-1 | ||
| tiff | source | bullseye | 4.2.0-1+deb11u6 | DLA-4026-1 | ||
| tiff | source | bookworm | 4.5.0-6+deb12u2 | |||
| tiff | source | (unstable) | 4.5.1+git230720-4 | 1061524 |
https://gitlab.com/libtiff/libtiff/-/issues/622
https://gitlab.com/libtiff/libtiff/-/merge_requests/546
https://gitlab.com/libtiff/libtiff/-/commit/51558511bdbbcffdce534db21dbaf5d54b31638a