Bug 54511 - tiff: Multiple issues (4.4)
Summary: tiff: Multiple issues (4.4)
Status: CLOSED FIXED
Alias: None
Product: UCS
Classification: Unclassified
Component: Security updates
Version: UCS 4.4
Hardware: All Linux
: P3 normal
Target Milestone: UCS 4.4-8-errata
Assignee: Quality Assurance
QA Contact: Erik Damrose
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-03-07 09:35 CET by Quality Assurance
Modified: 2022-03-09 13:25 CET (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Customer ID:
Max CVSS v3 score: 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2022-03-07 09:35:23 CET
New Debian tiff 4.0.8-2+deb9u8 fixes:
This update addresses the following issues:
* Denial of Service via crafted TIFF file (CVE-2022-0561)
* Null source pointer lead to Denial of Service via crafted TIFF file  (CVE-2022-0562)
* out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
Comment 1 Quality Assurance univentionstaff 2022-03-07 10:02:21 CET
--- mirror/ftp/4.4/unmaintained/component/4.4-8-errata/source/tiff_4.0.8-2+deb9u7.dsc
+++ apt/ucs_4.4-0-errata4.4-8/source/tiff_4.0.8-2+deb9u8.dsc
@@ -1,3 +1,18 @@
+4.0.8-2+deb9u8 [Sun, 06 Mar 2022 10:03:02 +0100] Thorsten Alteholz <debian@alteholz.de>:
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2022-22844
+    out-of-bounds read in _TIFFmemcpy in certain situations involving a
+    custom tag and 0x0200 as the second word of the DE field.
+  * CVE-2022-0562
+    Null source pointer passed as an argument to memcpy() function within
+    TIFFReadDirectory(). This could result in a Denial of Service via
+    crafted TIFF files.
+  * CVE-2022-0561
+    Null source pointer passed as an argument to memcpy() function within
+    TIFFFetchStripThing(). This could result in a Denial of Service via
+    crafted TIFF files.
+
 4.0.8-2+deb9u7 [Sat, 18 Sep 2021 18:41:25 +0530] Utkarsh Gupta <utkarsh@debian.org>:
 
   * Non-maintainer upload by the LTS team.

<http://piuparts.knut.univention.de/4.4-8/#5459938673791769831>
Comment 2 Erik Damrose univentionstaff 2022-03-08 17:29:14 CET
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.4-8] 91896509ac Bug #54511: tiff 4.0.8-2+deb9u8
 doc/errata/staging/tiff.yaml | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)