Bug 51207

Summary: tiff: Multiple issues (4.3)
Product: UCS Reporter: Quality Assurance <qa>
Component: Security updatesAssignee: Quality Assurance <qa>
Status: CLOSED FIXED QA Contact: Erik Damrose <damrose>
Severity: normal    
Priority: P3    
Version: UCS 4.3   
Target Milestone: UCS 4.3-5-errata   
Hardware: All   
OS: Linux   
What kind of report is it?: Security Issue What type of bug is this?: ---
Who will be affected by this bug?: --- How will those affected feel about the bug?: ---
User Pain: Enterprise Customer affected?:
School Customer affected?: ISV affected?:
Waiting Support: Flags outvoted (downgraded) after PO Review:
Ticket number: Bug group (optional):
Max CVSS v3 score: 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)

Description Quality Assurance univentionstaff 2020-05-04 09:15:41 CEST
New Debian tiff 4.0.8-2+deb9u5 fixes:
This update addresses the following issues:
* Heap-based buffer overflow in the cpSeparateBufToContigBuf function  resulting in a denial of service or possibly code execution  (CVE-2018-12900)
* NULL pointer dereference in function _TIFFmemcmp at tif_unix.c  (CVE-2018-17000)
* Integer overflow in multiply_ms in tools/ppm2tiff.c (CVE-2018-17100)
* NULL pointer dereference in TIFFWriteDirectorySec function in  tif_dirwrite.c (CVE-2018-19210)
* integer overflow in libtiff/tif_dirwrite.c resulting in an invalid pointer  dereference (CVE-2019-7663)
* integer overflow in _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c  (CVE-2019-14973)
* integer overflow leading to heap-based buffer overflow in tif_getimage.c  (CVE-2019-17546)
Comment 1 Quality Assurance univentionstaff 2020-05-04 10:00:16 CEST
--- mirror/ftp/4.3/unmaintained/4.3-3/source/tiff_4.0.8-2+deb9u4.dsc
+++ apt/ucs_4.3-0-errata4.3-5/source/tiff_4.0.8-2+deb9u5.dsc
@@ -1,3 +1,19 @@
+4.0.8-2+deb9u5 [Fri, 17 Apr 2020 16:28:49 +0000] Laszlo Boszormenyi (GCS) <gcs@debian.org>:
+
+  * Backport security fixes:
+    - CVE-2018-12900, heap-based buffer overflow in cpSeparateBufToContigBuf(),
+    - CVE-2018-17000, NULL pointer dereference in _TIFFmemcmp(),
+    - CVE-2018-17100, int32 overflow in multiply_ms(),
+    - CVE-2018-19210, NULL pointer dereference in TIFFWriteDirectorySec(),
+    - CVE-2019-14973, _TIFFCheckMalloc() and _TIFFCheckRealloc() mishandle
+      Integer Overflow checks,
+    - CVE-2019-17546, integer overflow that potentially causes a heap-based
+      buffer overflow,
+    - CVE-2019-7663, Invalid Address dereference in
+      TIFFWriteDirectoryTagTransfer() .
+  * Add required _TIFFCastUInt64ToSSize@LIBTIFF_4.0 and
+    _TIFFMultiplySSize@LIBTIFF_4.0 symbols to the libtiff5 package.
+
 4.0.8-2+deb9u4 [Thu, 29 Nov 2018 20:45:11 +0100] Moritz Mühlenhoff <jmm@debian.org>:
 
   * CVE-2018-5784 (Closes: #890441)

<http://10.200.17.11/4.3-5/#5459938673779862056>
Comment 2 Erik Damrose univentionstaff 2020-05-05 17:55:29 CEST
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.3-5] 12ffdf7d99 Bug #51207: tiff 4.0.8-2+deb9u5
 doc/errata/staging/tiff.yaml | 31 +++++++++++++++++++++++++++++++
 1 file changed, 31 insertions(+)
Comment 3 Erik Damrose univentionstaff 2020-05-06 14:52:32 CEST
<http://errata.software-univention.de/ucs/4.3/674.html>