Source: tiff
Version: 4.2.0-1+deb11u1
Severity: important
Tags: upstream
X-Debbugs-Cc: [email protected]

Dear Maintainer,

On https://security-tracker.debian.org/tracker/CVE-2022-3970 it is mentioned 
that
tiff is prone to critial, remotely attackable CVE-2022-3970.
Versions 4.1.0 (buster) and 4.2.0 are marked as vulnerable.
Shouldn't this require backporting the fix, if applicable?
If the bug does not affect these old versions, could you please change the 
tracker
entries accordingly?
Thanks for your work!

Best regards
Michael

-- System Information:
Debian Release: 11.6
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 
'proposed-updates'), (500, 'stable'), (100, 'bullseye-fasttrack'), (100, 
'bullseye-backports-staging')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-20-amd64 (SMP w/6 CPU threads)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de:en_US
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Reply via email to