Bug 48293 - tiff: Multiple issues (4.3)
tiff: Multiple issues (4.3)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.3
All Linux
: P3 normal (vote)
: UCS 4.3-2-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-12-06 16:19 CET by Quality Assurance
Modified: 2018-12-12 13:19 CET (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2018-12-06 16:19:40 CET
New Debian tiff 4.0.8-2+deb9u4 fixes:
This update addresses the following issues:
* Memory leak via corrupt td_imagelength in TIFFOpen function  (CVE-2017-11613)
* Heap-based buffer overflow in tools/pal2rgb.c can lead to denial of service  (CVE-2017-17095)
* uncontrolled resource consumption in TIFFSetDirectory function in tif_dir.c  (CVE-2018-5784)
* NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes a  denial of service (CVE-2018-7456)
* heap-based buffer overflow in tif_lzw.c:LZWDecodeCompat() allows for denial  of service (CVE-2018-8905)
* reachable assertion in TIFFWriteDirectorySec function in tif_dirwrite.c  (CVE-2018-10963)
* Heap-based buffer overflow in ChopUpSingleUncompressedStrip in  tif_dirread.c (CVE-2018-15209)
* Heap-based buffer overflow in ChopUpSingleUncompressedStrip in  tif_dirread.c (CVE-2018-16335)
* Two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c  (CVE-2018-17101)
* Out-of-bounds write in tif_jbig.c (CVE-2018-18557)
Comment 1 Quality Assurance univentionstaff 2018-12-06 17:07:00 CET
--- mirror/ftp/4.3/unmaintained/4.3-0/source/tiff_4.0.8-2+deb9u2.dsc
+++ apt/ucs_4.3-0-errata4.3-2/source/tiff_4.0.8-2+deb9u4.dsc
@@ -1,4 +1,16 @@
-4.0.8-2+deb9u2 [Sat, 30 Dec 2017 20:13:06 +0000] Laszlo Boszormenyi (GCS) <gcs@debian.org>:
+4.0.8-2+deb9u4 [Thu, 29 Nov 2018 20:45:11 +0100] Moritz Mühlenhoff <jmm@debian.org>:
+
+  * CVE-2018-5784 (Closes: #890441)
+  * CVE-2018-7456 (Closes: #891288)
+  * CVE-2018-8905 (Closes: #893806)
+  * CVE-2018-10963 (Closes: #898348)
+  * CVE-2018-17101 (Closes: #909037)
+  * CVE-2018-18557 (Closes: #911635)
+  * CVE-2017-11613 (Closes: #869823)
+  * CVE-2017-17095 (Closes: #883320)
+    (deb9u3 is unreleased, broken interim)
+
+4.0.8-2+deb9u2 [Sat, 30 Dec 2017 20:13:06 +0000] Moritz Mühlenhoff <jmm@debian.org>:
 
   * Fix CVE-2017-11335: heap based buffer write overflow in tiff2pdf
     (closes: #868513).

<http://10.200.17.11/4.3-2/#5459938673778779531>
Comment 2 Philipp Hahn univentionstaff 2018-12-06 20:10:30 CET
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.3-2] 011bfc16dd Bug #48293: tiff 4.0.8-2+deb9u4
 doc/errata/staging/tiff.yaml | 39 +++++++++++++++++++++++++++++++++++++++
 1 file changed, 39 insertions(+)
Comment 3 Arvid Requate univentionstaff 2018-12-12 13:19:35 CET
<http://errata.software-univention.de/ucs/4.3/378.html>