[SECURITY] [DLA 3847-1] dcmtk security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3847-1 [email protected]
https://www.debian.org/lts/security/ Adrian Bunk
June 28, 2024 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : dcmtk
Version : 3.6.4-2.1+deb10u1
CVE ID : CVE-2021-41687 CVE-2021-41688 CVE-2021-41689 CVE-2021-41690
CVE-2022-2121 CVE-2022-43272 CVE-2024-28130 CVE-2024-34508
CVE-2024-34509
Debian Bug : 1014044 1027165 1070207
Multiple vulnerabilities havebenn fixed in DCMTK, a collection of
libraries and applications implementing large parts the DICOM standard
for medical images.
CVE-2021-41687
Incorrect freeing of memory
CVE-2021-41688
Incorrect freeing of memory
CVE-2021-41689
NULL pointer dereference
CVE-2021-41690
Incorrect freeing of memory
CVE-2022-2121
NULL pointer dereference
CVE-2022-43272
Memory leak in single process mode
CVE-2024-28130
Segmentation faults due to incorrect typecast
CVE-2024-34508
Segmentation fault via invalid DIMSE message
CVE-2024-34509
Segmentation fault via invalid DIMSE message
For Debian 10 buster, these problems have been fixed in version
3.6.4-2.1+deb10u1.
We recommend that you upgrade your dcmtk packages.
For the detailed security status of dcmtk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/dcmtk
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmZ/ASwACgkQiNJCh6LY
mLFeZw//TBpdZJ/9oACfcDvHcgIPxvbiwqDtSQHnOBAtoszcOuufm3W9asAHUyjd
wyKk4PKM3FOH+h26VOpkD5zeOWv8pxLYWwOzLz6dVMa6TFcgFVeagGdLWHLqyDW2
caCal1rmlFtFOaghGnuo6OLtAVtSVJG52QCIuNDZJBSsz9bNS7KTj/TPqK0v3KOE
AkE6ozVmSmBfmTQvWyZKGUgjKU6gnA0bqqJZHt8whlDD3MX9X+s26FJOHp5hlYKT
Kj0lsXPctT8eDwJWfZgOZC2c2i4ZMrR48XxLkiOnDsErq6RdkUvtvOh4p7MIxkVu
7sbw3hnCSaRaIUUCTd9H14EUucOfHgAS92tQFO5lzRqsJiXJ+EZSO2AsOdDwxbnD
a7/rVhfMaDxbbt8Qze9Xev65hHnJ7MKzf4L6uncaucy9Pp3p1SE/BL0pXHx+yc6p
C+I/9dc3MRtCJ8zqjXtKOiUQL/XuzFTETE9+VYRGsCDAN+2GzNSEUj33rhIa/V8a
Q3SVRCSLzXXPfRhldMmg78fWPgpapQinekr5IY0c2tEKkKtcgx0VPAJkomyBqy/i
UdrqRUo4zIk5J6h1s4MwgwWE/okLChGhbaLoDFuy8dxibUbkPTG/Gfq7vdDhydH+
UbsG1pSFast6edAKuwkwo8j+GBmpE48KSBhN2Jgc4WOzDH0I0SM=
=uvO5
-----END PGP SIGNATURE-----
Reply to: