[SECURITY] [DLA 4038-1] dcmtk security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4038-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Adrian Bunk
January 31, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : dcmtk
Version : 3.6.5-1+deb11u1
CVE ID : CVE-2021-41687 CVE-2021-41688 CVE-2021-41689 CVE-2021-41690
CVE-2022-2121 CVE-2022-43272 CVE-2024-28130 CVE-2024-34508
CVE-2024-34509 CVE-2024-47796 CVE-2024-52333
Debian Bug : 1014044 1027165 1070207 1093043 1093047
Multiple vulnerabilities have been fixed in DCMTK, a collection of
libraries and applications implementing large parts the DICOM standard
for medical images.
CVE-2021-41687
Incorrect freeing of memory
CVE-2021-41688
Incorrect freeing of memory
CVE-2021-41689
NULL pointer dereference
CVE-2021-41690
Incorrect freeing of memory
CVE-2022-2121
NULL pointer dereference
CVE-2022-43272
Memory leak in single process mode
CVE-2024-28130
Segmentation faults due to incorrect typecast
CVE-2024-34508
Segmentation fault via invalid DIMSE message
CVE-2024-34509
Segmentation fault via invalid DIMSE message
CVE-2024-47796
Improper array index validation
CVE-2024-52333
Improper array index validation
For Debian 11 bullseye, these problems have been fixed in version
3.6.5-1+deb11u1.
We recommend that you upgrade your dcmtk packages.
For the detailed security status of dcmtk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/dcmtk
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmedRJAACgkQiNJCh6LY
mLHxAg//VnIOFwjGdYSLBuonTJRajt7BSTak4VOv5otJ6+ESFpvN79fFhrO6nrbj
kMRVhX9QWiQC0WYtHfmV+ZLqLbrWXA7mCQywBEMN7CSH4o1JBAvkZ3GQuQicRjay
82wUy1vmc2hzxoTasmTtU6xNP4Kb7hNknhQpM21v5Ds16YNuGmjqhgujBNeZLnhE
pqBKWs+w3qKfWyurw7al52+ExTHSldre7eu5fmg3S7sQSSZsUlWUW+FMDjMNV1rM
I6cyK4INkUWmmcSDygzyXpJQbTkyX170J93VdzGxgDKMHHMCHIQJYtI89noOkbDy
TVTnbDNpZi/ey2WysBlhdm+KaEMUqJLbh4Bxg9woHpHzsnEp6EE1+KdmQEWEoa7Q
eL8uqx7EdLxtBpAfJy747cXRplh13/WFk8RUHSA5Yx0pfZuzFYp626eZudtIPhEB
NFCurLG2SZUomJ44vwf18j5botC1WSlgb0B+GnfXm2v1bpwF1j+l+ZayLyB+Yhg4
CNnR66N6LSqJZUMoisF9JkE4waTJ10wEVtHJOIcpS6bv+PKMn86usQhf7p/XBK2w
Z2c7WUYEk8zJEm1/gptVuM+0Fd4/3Tik8Su7gnR5HFsfj27C9xQGL0YTyBs6tAw8
k7UVUWeMFYoydVAfgnUe/N80fKYzgtwgUfycQJGBXcIwn4FRVIE=
=8Djh
-----END PGP SIGNATURE-----
Reply to: