CVE-2024-13978

NameCVE-2024-13978
DescriptionA vulnerability was found in LibTIFF up to 4.7.0. It has been declared as problematic. Affected by this vulnerability is the function t2p_read_tiff_init of the file tools/tiff2pdf.c of the component fax2ps. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The patch is named 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4. It is recommended to apply a patch to fix this issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1111323

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tiff (PTS)bullseye4.2.0-1+deb11u5vulnerable
bullseye (security)4.2.0-1+deb11u6vulnerable
bookworm4.5.0-6+deb12u2vulnerable
bookworm (security)4.5.0-6+deb12u1vulnerable
trixie4.7.0-3vulnerable
forky, sid4.7.0-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tiffsource(unstable)4.7.0-41111323

Notes

[trixie] - tiff <no-dsa> (Minor issue)
[bookworm] - tiff <no-dsa> (Minor issue)
[bullseye] - tiff <postponed> (Minor issue)
https://gitlab.com/libtiff/libtiff/-/issues/649
https://gitlab.com/libtiff/libtiff/-/issues/650
https://gitlab.com/libtiff/libtiff/-/merge_requests/667
https://gitlab.com/libtiff/libtiff/-/commit/7be20ccaab97455f192de0ac561ceda7cd9e12d1
https://gitlab.com/libtiff/libtiff/-/commit/2ebfffb0e8836bfb1cd7d85c059cd285c59761a4

Search for package or bug name: Reporting problems