Bug 51204 - tiff: Multiple issues (4.4)
tiff: Multiple issues (4.4)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.4
All Linux
: P3 normal (vote)
: UCS 4.4-4-errata
Assigned To: Quality Assurance
Erik Damrose
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-05-04 08:51 CEST by Quality Assurance
Modified: 2020-05-06 14:40 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2020-05-04 08:51:07 CEST
New Debian tiff 4.0.8-2+deb9u5 fixes:
This update addresses the following issues:
* Heap-based buffer overflow in the cpSeparateBufToContigBuf function  resulting in a denial of service or possibly code execution  (CVE-2018-12900)
* NULL pointer dereference in function _TIFFmemcmp at tif_unix.c  (CVE-2018-17000)
* Integer overflow in multiply_ms in tools/ppm2tiff.c (CVE-2018-17100)
* NULL pointer dereference in TIFFWriteDirectorySec function in  tif_dirwrite.c (CVE-2018-19210)
* integer overflow in libtiff/tif_dirwrite.c resulting in an invalid pointer  dereference (CVE-2019-7663)
* integer overflow in _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c  (CVE-2019-14973)
* integer overflow leading to heap-based buffer overflow in tif_getimage.c  (CVE-2019-17546)
Comment 1 Quality Assurance univentionstaff 2020-05-04 09:00:09 CEST
--- mirror/ftp/4.3/unmaintained/4.3-3/source/tiff_4.0.8-2+deb9u4.dsc
+++ apt/ucs_4.4-0-errata4.4-4/source/tiff_4.0.8-2+deb9u5.dsc
@@ -1,3 +1,19 @@
+4.0.8-2+deb9u5 [Fri, 17 Apr 2020 16:28:49 +0000] Laszlo Boszormenyi (GCS) <gcs@debian.org>:
+
+  * Backport security fixes:
+    - CVE-2018-12900, heap-based buffer overflow in cpSeparateBufToContigBuf(),
+    - CVE-2018-17000, NULL pointer dereference in _TIFFmemcmp(),
+    - CVE-2018-17100, int32 overflow in multiply_ms(),
+    - CVE-2018-19210, NULL pointer dereference in TIFFWriteDirectorySec(),
+    - CVE-2019-14973, _TIFFCheckMalloc() and _TIFFCheckRealloc() mishandle
+      Integer Overflow checks,
+    - CVE-2019-17546, integer overflow that potentially causes a heap-based
+      buffer overflow,
+    - CVE-2019-7663, Invalid Address dereference in
+      TIFFWriteDirectoryTagTransfer() .
+  * Add required _TIFFCastUInt64ToSSize@LIBTIFF_4.0 and
+    _TIFFMultiplySSize@LIBTIFF_4.0 symbols to the libtiff5 package.
+
 4.0.8-2+deb9u4 [Thu, 29 Nov 2018 20:45:11 +0100] Moritz Mühlenhoff <jmm@debian.org>:
 
   * CVE-2018-5784 (Closes: #890441)

<http://10.200.17.11/4.4-4/#5459938673779862056>
Comment 2 Erik Damrose univentionstaff 2020-05-05 17:48:36 CEST
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.4-4] 4860061ac7 Bug #51204: tiff 4.0.8-2+deb9u5
 doc/errata/staging/tiff.yaml | 31 +++++++++++++++++++++++++++++++
 1 file changed, 31 insertions(+)
Comment 3 Erik Damrose univentionstaff 2020-05-06 14:40:06 CEST
<http://errata.software-univention.de/ucs/4.4/581.html>