SUSE-SU-2018:1179-1: moderate: Security update for tiff
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Wed May 9 10:12:45 MDT 2018
SUSE Security Update: Security update for tiff
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1179-1
Rating: moderate
References: #1007280 #1011107 #1011845 #1017688 #1017690
#1017691 #1017692 #1031255 #1046077 #1048937
#1074318 #960341 #983436
Cross-References: CVE-2015-7554 CVE-2016-10095 CVE-2016-10268
CVE-2016-3945 CVE-2016-5318 CVE-2016-5652
CVE-2016-9453 CVE-2016-9536 CVE-2017-11335
CVE-2017-17973 CVE-2017-9935
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
An update that solves 11 vulnerabilities and has two fixes
is now available.
Description:
This update for tiff fixes the following issues:
- CVE-2016-9453: The t2p_readwrite_pdf_image_tile function allowed remote
attackers to cause a denial of service (out-of-bounds write and crash)
or possibly execute arbitrary code via a JPEG file with a
TIFFTAG_JPEGTABLES of length one (bsc#1011107).
- CVE-2016-5652: An exploitable heap-based buffer overflow existed in the
handling of TIFF images in the TIFF2PDF tool. A crafted TIFF document
can lead to a heap-based buffer overflow resulting in remote code
execution. Vulnerability can be triggered via a saved TIFF file
delivered by other means (bsc#1007280).
- CVE-2017-11335: There is a heap based buffer overflow in
tools/tiff2pdf.c via a PlanarConfig=Contig image, which caused a more
than one hundred bytes out-of-bounds write (related to the ZIPDecode
function in tif_zip.c). A crafted input may lead to a remote denial of
service attack or an arbitrary code execution attack (bsc#1048937).
- CVE-2016-9536: tools/tiff2pdf.c had an out-of-bounds write
vulnerabilities in heap allocated buffers in t2p_process_jpeg_strip().
Reported as MSVR 35098, aka "t2p_process_jpeg_strip
heap-buffer-overflow." (bsc#1011845)
- CVE-2017-9935: In LibTIFF, there was a heap-based buffer overflow in the
t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could
lead to different damages. For example, a crafted TIFF document can lead
to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or
t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free
in t2p_free. Given these possibilities, it probably could cause
arbitrary code execution (bsc#1046077).
- CVE-2017-17973: There is a heap-based use-after-free in the
t2p_writeproc function in tiff2pdf.c. (bsc#1074318)
- CVE-2015-7554: The _TIFFVGetField function in tif_dir.c allowed
attackers to cause a denial of service (invalid memory write and crash)
or possibly have unspecified other impact via crafted field data in an
extension tag in a TIFF image (bsc#960341).
- CVE-2016-5318: Stack-based buffer overflow in the _TIFFVGetField
function allowed remote attackers to crash the application via a crafted
tiff (bsc#983436).
- CVE-2016-10095: Stack-based buffer overflow in the _TIFFVGetField
function in tif_dir.c allowed remote attackers to cause a denial of
service (crash) via a crafted TIFF file (bsc#1017690,).
- CVE-2016-10268: tools/tiffcp.c allowed remote attackers to cause a
denial of service (integer underflow and heap-based buffer under-read)
or possibly have unspecified other impact via a crafted TIFF image,
related to "READ of size 78490" and libtiff/tif_unix.c:115:23
(bsc#1031255)
- An overlapping of memcpy parameters was fixed which could lead to
content corruption (bsc#1017691).
- Fixed an invalid memory read which could lead to a crash (bsc#1017692).
- Fixed a NULL pointer dereference in TIFFReadRawData (tiffinfo.c) that
could crash the decoder (bsc#1017688).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-tiff-13594=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-tiff-13594=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-tiff-13594=1
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
libtiff-devel-3.8.2-141.169.3.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64):
libtiff-devel-32bit-3.8.2-141.169.3.1
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
libtiff3-3.8.2-141.169.3.1
tiff-3.8.2-141.169.3.1
- SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):
libtiff3-32bit-3.8.2-141.169.3.1
- SUSE Linux Enterprise Server 11-SP4 (ia64):
libtiff3-x86-3.8.2-141.169.3.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
tiff-debuginfo-3.8.2-141.169.3.1
tiff-debugsource-3.8.2-141.169.3.1
References:
https://www.suse.com/security/cve/CVE-2015-7554.html
https://www.suse.com/security/cve/CVE-2016-10095.html
https://www.suse.com/security/cve/CVE-2016-10268.html
https://www.suse.com/security/cve/CVE-2016-3945.html
https://www.suse.com/security/cve/CVE-2016-5318.html
https://www.suse.com/security/cve/CVE-2016-5652.html
https://www.suse.com/security/cve/CVE-2016-9453.html
https://www.suse.com/security/cve/CVE-2016-9536.html
https://www.suse.com/security/cve/CVE-2017-11335.html
https://www.suse.com/security/cve/CVE-2017-17973.html
https://www.suse.com/security/cve/CVE-2017-9935.html
https://bugzilla.suse.com/1007280
https://bugzilla.suse.com/1011107
https://bugzilla.suse.com/1011845
https://bugzilla.suse.com/1017688
https://bugzilla.suse.com/1017690
https://bugzilla.suse.com/1017691
https://bugzilla.suse.com/1017692
https://bugzilla.suse.com/1031255
https://bugzilla.suse.com/1046077
https://bugzilla.suse.com/1048937
https://bugzilla.suse.com/1074318
https://bugzilla.suse.com/960341
https://bugzilla.suse.com/983436
More information about the sle-security-updates
mailing list