Univention Bugzilla – Full Text Bug Listing |
Summary: | tiff: Multiple issues (4.2) | ||
---|---|---|---|
Product: | UCS | Reporter: | Arvid Requate <requate> |
Component: | Security updates | Assignee: | Philipp Hahn <hahn> |
Status: | CLOSED FIXED | QA Contact: | Arvid Requate <requate> |
Severity: | normal | ||
Priority: | P3 | CC: | hahn |
Version: | UCS 4.2 | Flags: | requate:
Patch_Available+
|
Target Milestone: | UCS 4.2-3-errata | ||
Hardware: | Other | ||
OS: | Linux | ||
URL: | http://metadata.ftp-master.debian.org/changelogs/main/t/tiff/tiff_4.0.3-12.3+deb8u4_changelog | ||
What kind of report is it?: | Security Issue | What type of bug is this?: | --- |
Who will be affected by this bug?: | --- | How will those affected feel about the bug?: | --- |
User Pain: | Enterprise Customer affected?: | ||
School Customer affected?: | ISV affected?: | ||
Waiting Support: | Flags outvoted (downgraded) after PO Review: | ||
Ticket number: | Bug group (optional): | Security | |
Max CVSS v3 score: | 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | ||
Bug Depends on: | |||
Bug Blocks: | 42896 |
Description
Arvid Requate
2017-05-10 13:41:12 CEST
Upstream Debian package version 4.0.3-12.3+deb8u4 fixes: * assertion abort in the TIFFWriteDirectoryTagCheckedLong8Array function in tif_dirwrite.c. A crafted input will lead to a remote denial of service attack. (CVE-2017-10688) * memory leak in tif_jbig.c. A crafted TIFF document can lead to a memory leak resulting in a remote denial of service attack. (CVE-2017-9936) Mass-import from Debian-Security: python -m univention.repong.^Cbmirror -s jessie -r 4.2-3 --override=$HOME/REPOS/repo-ng/mirror/update_ucs42_mirror_from_debian.yml --errata=doc/errata --sql --process=ALL -vvvv --now=201801211553 YAML: git:bd6159834a..449aa5a7cf tiff ( 4.0.3-12.3+deb8u5) jessie-security: * CVE-2017-9935 libtiff: Heap-based buffer overflow in t2p_write_pdf function * CVE-2017-11335 libtiff: Heap-based buffer overflow in tiff2pdf * CVE-2017-12944 libtiff: Mishandled memory allocation for short files in the TIFFReadDirEntryArray function * CVE-2017-13726 libtiff: Reachable assertion abort in the function TIFFWriteDirectorySec() * CVE-2017-13727 libtiff: Reachable assertion abort in the function TIFFWriteDirectoryTagSubifd() * CVE-2017-18013 libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes crash d524ff9c13 Bug #44571: tiff --- mirror/ftp/4.2/unmaintained/4.2-0/source/tiff_4.0.3-12.3+deb8u2.dsc +++ apt/ucs_4.2-0-errata4.2-3/source/tiff_4.0.3-12.3+deb8u5.dsc @@ -1,3 +1,63 @@ +4.0.3-12.3+deb8u5 [Fri, 26 Jan 2018 20:53:45 +0000] Moritz Muehlenhoff <jmm@debian.org>: + + [ Laszlo Boszormenyi (GCS) ] + * Fix CVE-2017-11335: heap based buffer write overflow in tiff2pdf + (closes: #868513). + * Fix CVE-2017-12944: OOM prevention in TIFFReadDirEntryArray() + (closes: #872607). + * Fix CVE-2017-13726: reachable assertion abort in TIFFWriteDirectorySec() + (closes: #873880). + * Fix CVE-2017-13727: reachable assertion abort in + TIFFWriteDirectoryTagSubifd() (closes: #873879). + * Fix CVE-2017-18013: NULL pointer dereference in TIFFPrintDirectory() + (closes: #885985). + * Fix CVE-2017-9935: heap-based buffer overflow in the t2p_write_pdf() + function (closes: #866109). + + [ Moritz Muehlenhoff ] + * CVE-2016-10371 + +4.0.3-12.3+deb8u4 [Sun, 02 Jul 2017 08:35:22 +0000] Laszlo Boszormenyi (GCS) <gcs@debian.org>: + + * Backport fix for the following vulnerabilities: + - CVE-2017-9403: fix memory leak in non DEFER_STRILE_LOAD mode, + - CVE-2017-9404: memory leak vulnerability was found in the function + OJPEGReadHeaderInfoSecTablesQTable(), + - CVE-2016-10095 and CVE-2017-9147: add _TIFFCheckFieldIsValidForCodec() + and use it in TIFFReadDirectory() (closes: #850316, #863185), + - CVE-2017-9936: memory leak in error code path of JBIGDecode() + (closes: #866113), + - prevent out of memory in gtTileContig() on corrupted files, + - CVE-2017-10688, assertion failure in TIFFWriteDirectoryTagCheckedXXXX() + (closes: #866611). + * Add required _TIFFCheckFieldIsValidForCodec@LIBTIFF_4.0 and + _TIFFReadEncodedStripAndAllocBuffer@LIBTIFF_4.0 symbols to the + libtiff5 package. + +4.0.3-12.3+deb8u3 [Fri, 21 Apr 2017 20:22:02 +0000] Laszlo Boszormenyi (GCS) <gcs@debian.org>: + + * Backport fix for the following vulnerabilities: + - CVE-2014-8127 and CVE-2016-3658: out-of-bounds read in the tiffset tool, + - CVE-2016-9535: replace assertions by runtime checks to avoid assertions + in debug mode, or buffer overflows in release mode, + - CVE-2016-10266: divide-by-zero in TIFFReadEncodedStrip, + - CVE-2016-10267: divide-by-zero in OJPEGDecodeRaw, + - CVE-2016-10269: heap-based buffer overflow in _TIFFmemcpy, + - CVE-2016-10270: heap-based buffer overflow in TIFFFillStrip, + - CVE-2017-5225: heap buffer overflow via a crafted BitsPerSample value, + - CVE-2017-7592: left-shift undefined behavior issue in putagreytile, + - CVE-2017-7593: unitialized-memory access from tif_rawdata, + - CVE-2017-7594: leak in OJPEGReadHeaderInfoSecTablesAcTable, + - CVE-2017-7595: divide-by-zero in JPEGSetupEncode, + - CVE-2017-7596, CVE-2017-7597, CVE-2017-7598, CVE-2017-7599, + CVE-2017-7600, CVE-2017-7601 and CVE-2017-7602: multiple UBSAN crashes. + * Add required _TIFFcalloc@LIBTIFF_4.0 symbol to the libtiff5 package. + + [ Tobias Lippert <lippertto_oss@fastmail.com> ] + * Fix a regression introduced by patch CVE-2014-8128-5 where enabling + compression of tif files results in corrupt files + (closes: #783555, #818360). + 4.0.3-12.3+deb8u2 [Mon, 21 Nov 2016 21:32:06 +0000] Laszlo Boszormenyi (GCS) <gcs@debian.org>: * Backport fix for the following vulnerabilities: * No UCS specific patches * Comparison to previously shipped version ok * Binary package update Ok * Advisory adjusted: a08f56dd87 | Bug #44571: Fix CVE sorting |