Univention Bugzilla – Full Text Bug Listing |
Summary: | tiff: Multiple issues (4.2) | ||
---|---|---|---|
Product: | UCS | Reporter: | Quality Assurance <qa> |
Component: | Security updates | Assignee: | Quality Assurance <qa> |
Status: | CLOSED FIXED | QA Contact: | Philipp Hahn <hahn> |
Severity: | normal | ||
Priority: | P3 | ||
Version: | UCS 4.2 | ||
Target Milestone: | UCS 4.2-4-errata | ||
Hardware: | All | ||
OS: | Linux | ||
What kind of report is it?: | Security Issue | What type of bug is this?: | --- |
Who will be affected by this bug?: | --- | How will those affected feel about the bug?: | --- |
User Pain: | Enterprise Customer affected?: | ||
School Customer affected?: | ISV affected?: | ||
Waiting Support: | Flags outvoted (downgraded) after PO Review: | ||
Ticket number: | Bug group (optional): | ||
Max CVSS v3 score: | 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) |
Description
Quality Assurance
2018-08-09 10:19:50 CEST
--- mirror/ftp/4.2/unmaintained/4.2-4/source/tiff_4.0.3-12.3+deb8u5.dsc +++ apt/ucs_4.2-0-errata4.2-4/source/tiff_4.0.3-12.3+deb8u6.dsc @@ -1,3 +1,36 @@ +4.0.3-12.3+deb8u6 [Mon, 02 Jul 2018 13:04:59 +0200] Markus Koschany <apo@debian.org>: + + * Non-maintainer upload by the LTS team. + * Fix CVE-2017-11613: DoS vulnerability + A crafted input will lead to a denial of service attack. During the + TIFFOpen process, td_imagelength is not checked. The value of + td_imagelength can be directly controlled by an input file. In the + ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is + called based on td_imagelength. If the value of td_imagelength is set close + to the amount of system memory, it will hang the system or trigger the OOM + killer. (Closes: #869823) + * Fix CVE-2018-10963: DoS vulnerability + The TIFFWriteDirectorySec() function in tif_dirwrite.c in LibTIFF allows + remote attackers to cause a denial of service (assertion failure and + application crash) via a crafted file, a different vulnerability than + CVE-2017-13726. (Closes: #898348) + * Fix CVE-2018-5784: DoS vulnerability + In LibTIFF, there is an uncontrolled resource consumption in the + TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage + this vulnerability to cause a denial of service via a crafted tif file. + This occurs because the declared number of directory entries is not + validated against the actual number of directory entries. (Closes: #890441) + * Fix CVE-2018-7456: NULL Pointer Dereference + A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in + tif_print.c in LibTIFF when using the tiffinfo tool to print crafted + TIFF information, a different vulnerability than CVE-2017-18013. (This + affects an earlier part of the TIFFPrintDirectory function that was not + addressed by the CVE-2017-18013 patch.) (Closes: #891288) + * Fix CVE-2018-8905: Heap-based buffer overflow + In LibTIFF, a heap-based buffer overflow occurs in the function + LZWDecodeCompat in tif_lzw.c via a crafted TIFF file, as demonstrated by + tiff2ps. (Closes: #893806) + 4.0.3-12.3+deb8u5 [Fri, 26 Jan 2018 20:53:45 +0000] Moritz Muehlenhoff <jmm@debian.org>: [ Laszlo Boszormenyi (GCS) ] <http://10.200.17.11/4.2-4/#573244148462271962> OK: yaml OK: errata-announce OK: patch OK: piuparts [4.2-4] 77d8f20131 Bug #47545: tiff 4.0.3-12.3+deb8u6 doc/errata/staging/tiff.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) [4.2-4] 5984f1fcdb Bug #47545: tiff 4.0.3-12.3+deb8u6 doc/errata/staging/tiff.yaml | 52 +++++++++++++------------------------------- 1 file changed, 15 insertions(+), 37 deletions(-) [4.2-4] 24aa828c58 Bug #47545: tiff 4.0.3-12.3+deb8u6 doc/errata/staging/tiff.yaml | 53 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 53 insertions(+) |