tiff: CVE-2017-12944

Related Vulnerabilities: CVE-2017-12944  

Debian Bug report logs - #872607
tiff: CVE-2017-12944

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sat, 19 Aug 2017 07:18:02 UTC

Severity: important

Tags: patch, security, upstream

Found in version tiff/4.0.8-4

Fixed in version tiff/4.0.8-6

Done: Laszlo Boszormenyi (GCS) <gcs@debian.org>

Bug is archived. No further changes may be made.

Forwarded to http://bugzilla.maptools.org/show_bug.cgi?id=2725

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Laszlo Boszormenyi (GCS) <gcs@debian.org>:
Bug#872607; Package src:tiff. (Sat, 19 Aug 2017 07:18:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Laszlo Boszormenyi (GCS) <gcs@debian.org>. (Sat, 19 Aug 2017 07:18:03 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: tiff: CVE-2017-12944
Date: Sat, 19 Aug 2017 09:15:35 +0200
Source: tiff
Version: 4.0.8-4
Severity: important
Tags: patch security upstream
Forwarded: http://bugzilla.maptools.org/show_bug.cgi?id=2725

Hi,

the following vulnerability was published for tiff.

CVE-2017-12944[0]:
| The TIFFReadDirEntryArray function in tif_read.c in LibTIFF 4.0.8
| mishandles memory allocation for short files, which allows remote
| attackers to cause a denial of service (allocation failure and
| application crash) in the TIFFFetchStripThing function in tif_dirread.c
| during a tiff2pdf invocation.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-12944
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12944
[1] http://bugzilla.maptools.org/show_bug.cgi?id=2725

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Reply sent to Laszlo Boszormenyi (GCS) <gcs@debian.org>:
You have taken responsibility. (Sun, 29 Oct 2017 16:03:05 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 29 Oct 2017 16:03:05 GMT) (full text, mbox, link).


Message #10 received at 872607-close@bugs.debian.org (full text, mbox, reply):

From: Laszlo Boszormenyi (GCS) <gcs@debian.org>
To: 872607-close@bugs.debian.org
Subject: Bug#872607: fixed in tiff 4.0.8-6
Date: Sun, 29 Oct 2017 15:58:39 +0000
Source: tiff
Source-Version: 4.0.8-6

We believe that the bug you reported is fixed in the latest version of
tiff, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 872607@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Laszlo Boszormenyi (GCS) <gcs@debian.org> (supplier of updated tiff package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sun, 29 Oct 2017 13:29:44 +0000
Source: tiff
Binary: libtiff5 libtiffxx5 libtiff5-dev libtiff-tools libtiff-opengl libtiff-doc
Architecture: source all amd64
Version: 4.0.8-6
Distribution: unstable
Urgency: high
Maintainer: Laszlo Boszormenyi (GCS) <gcs@debian.org>
Changed-By: Laszlo Boszormenyi (GCS) <gcs@debian.org>
Description:
 libtiff-doc - TIFF manipulation and conversion documentation
 libtiff-opengl - TIFF manipulation and conversion tools
 libtiff-tools - TIFF manipulation and conversion tools
 libtiff5   - Tag Image File Format (TIFF) library
 libtiff5-dev - Tag Image File Format library (TIFF), development files
 libtiffxx5 - Tag Image File Format (TIFF) library -- C++ interface
Closes: 872607
Changes:
 tiff (4.0.8-6) unstable; urgency=high
 .
   * Backport security fixes:
     - prevent OOM in gtTileContig() ,
     - prevent OOM in TIFFFetchStripThing() ,
     - CVE-2017-12944, OOM prevention in TIFFReadDirEntryArray()
       (closes: #872607),
     - avoid floating point division by zero in initCIELabConversion() .
Checksums-Sha1:
 47f2a68713c1619c4c4f543340beb1e2c09f9c9c 2157 tiff_4.0.8-6.dsc
 fc66db0e02a57a75c2ceefd82e9c221b0ee87c90 27344 tiff_4.0.8-6.debian.tar.xz
 b1ddc74b98991fbf934d567ae90d285d9a52712c 395888 libtiff-doc_4.0.8-6_all.deb
 352a83c39e4179dcd7827b9f394cf6dd3e536c5b 14348 libtiff-opengl-dbgsym_4.0.8-6_amd64.deb
 fe6130c2f640a57483ebc0bbdd4311acbbf473bc 101128 libtiff-opengl_4.0.8-6_amd64.deb
 3778bf6e43bc42827705c36b3c8ce39a7a96b447 352552 libtiff-tools-dbgsym_4.0.8-6_amd64.deb
 9347b6328a0a3cdd016e46c29fa79164c30f9fff 282980 libtiff-tools_4.0.8-6_amd64.deb
 01efa8c89a81d8933f8050fdda7c6f416eeeae69 372620 libtiff5-dbgsym_4.0.8-6_amd64.deb
 4c0a97d9c2915c12c3d3cf5203172bb8358540dc 361628 libtiff5-dev_4.0.8-6_amd64.deb
 55f3eeaf064b5bd1625054d911bef1235c729700 240124 libtiff5_4.0.8-6_amd64.deb
 8a38ab63ede2b952fb031ff0013da55c63683274 21060 libtiffxx5-dbgsym_4.0.8-6_amd64.deb
 4c5fd46ffb74f15105463ca3078544ba38bb09d4 96240 libtiffxx5_4.0.8-6_amd64.deb
 99a4f97b804d9ff3b0cdb7e0abd404c747d24249 11754 tiff_4.0.8-6_amd64.buildinfo
Checksums-Sha256:
 710a29a4cbd29583170b294cb1c574cc8bc27b3d4af8b00b47d0c688642b0a92 2157 tiff_4.0.8-6.dsc
 9307f5343882fa0d8229d20f35cd03cf113dc88881bf697b0ee2b3969ffdbe72 27344 tiff_4.0.8-6.debian.tar.xz
 f6d90b91d0a2e884590c1ce33fbcaa89ad95187cc4e00c61978f86bed3da0b51 395888 libtiff-doc_4.0.8-6_all.deb
 20eb2776bd6974be877397d2ec7a1b0e2c35babd32b023f29be06d2f6e13480b 14348 libtiff-opengl-dbgsym_4.0.8-6_amd64.deb
 f8e406232ca77863e17353a8a1ecd065097d74927cc581942da4e19e888ba685 101128 libtiff-opengl_4.0.8-6_amd64.deb
 9f8b96c21a7346489961b86e65a5b6f300903cdc9b0199e035aece2f7fede3b2 352552 libtiff-tools-dbgsym_4.0.8-6_amd64.deb
 4e834ca6731b08160dc759322c675d7dbe1411cb7bac26418a80ee67745beb79 282980 libtiff-tools_4.0.8-6_amd64.deb
 da7889af96c41bbedca6646abb043747f2aff9dd98193d440a4bb614c008ad17 372620 libtiff5-dbgsym_4.0.8-6_amd64.deb
 c2c5f6d751aa9423dee0f0f23a3b0c9c8d04c9ddaaff9de1bf14e0e4629cdf7d 361628 libtiff5-dev_4.0.8-6_amd64.deb
 a30fc876c40acde75808e37f24943230ba3b361f61c85172a44009bedbd0054a 240124 libtiff5_4.0.8-6_amd64.deb
 671ad6ae172f2c8350f308f4a7152622fdd760f95937fc6e8d7e9cea53508ccc 21060 libtiffxx5-dbgsym_4.0.8-6_amd64.deb
 9a6764d43fd62bd298d7d83b598f5ecc8b5c57877a3c76c6a5b86297127d5384 96240 libtiffxx5_4.0.8-6_amd64.deb
 49e492e50972e86614d8f10cae84eff9c2d7f533df59df173c8e4edd8fa39867 11754 tiff_4.0.8-6_amd64.buildinfo
Files:
 5607bafc5f20416dd51e7cfe46f481a9 2157 libs optional tiff_4.0.8-6.dsc
 d371850b76d6563f2d2889a0f6c2504c 27344 libs optional tiff_4.0.8-6.debian.tar.xz
 7e2ead39997bc5f63d800078046b69dd 395888 doc optional libtiff-doc_4.0.8-6_all.deb
 b3ade490aefa54338f4501c2891c47f8 14348 debug optional libtiff-opengl-dbgsym_4.0.8-6_amd64.deb
 bdf459b586fd97625ae9899273319236 101128 graphics optional libtiff-opengl_4.0.8-6_amd64.deb
 efe42a130b5771d5d7f1960509825614 352552 debug optional libtiff-tools-dbgsym_4.0.8-6_amd64.deb
 93ca48dd9d1b6cf97f981e8bdfe6ef48 282980 graphics optional libtiff-tools_4.0.8-6_amd64.deb
 495edffdd0bf2447f4d2fed0339e4719 372620 debug optional libtiff5-dbgsym_4.0.8-6_amd64.deb
 9b7cfaaa0ff900fde90c617126781f38 361628 libdevel optional libtiff5-dev_4.0.8-6_amd64.deb
 7153f3884d32e01d2d16f120613a9439 240124 libs optional libtiff5_4.0.8-6_amd64.deb
 868d41152d09e7722ee5a28b5f69b203 21060 debug optional libtiffxx5-dbgsym_4.0.8-6_amd64.deb
 2fff65a1aaa2917d33285e4f46e79334 96240 libs optional libtiffxx5_4.0.8-6_amd64.deb
 39ecf81b5b31210f342a98a4a4c7dea9 11754 libs optional tiff_4.0.8-6_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEfYh9yLp7u6e4NeO63OMQ54ZMyL8FAln186IACgkQ3OMQ54ZM
yL9v9xAAm5yzcXos5X15ApmDneFjdul2xLJmgx53jtHYbIhHknAQjKdxFMJF+S4D
j7VipOHip6VhQh6cMbUhkIeappy63h9sqXYAwGxz+BPa5kmT3QNxUupOZPtxcb5U
V/KD/eNGDoQhJTz+ak7rPILH9Bb7ZjAtLBvd27QkVe2kR2vWem/S0pkLNrKIcOlp
vu0U2Bu53cWDnlCTJwqcI6WToZ8Nou8LreDKqjumPNon+fKzRPubQccANU7H2J5e
dI+5d9t5UTTkSG/3+fmG3Xha9WccG02dNpD7WpgKtmE/2TYuiT6iu9prlMkboHaH
TkxjyvHhieye+GVsw8+zZpESfkSTwauTUn4hc4Z79GHUhfkFVizu3oar4irVqovN
nizP387LEvtLjjHhawyFoATWAjEaUJm6tDEl1Jv5EWS9veAZcuFjM7NQgYJA9Ej+
/NR592j4QN8y95c/pXM3zuPZV/mPH5f3tTwbET5YypnMvLthajQimwb3lIlJRmye
+USm7m0w4ubShSfbdISRsodQiZFG9UIO+Qx9i9CCu3d+fyAS3CAsfyeqLTl7vOg5
+TzifnLP8Gud9ZzkZkuE3jqSCnJQSjaUsDVuv0MjlCZYw3V6rio7b3rLfxCxTQ2f
A+IQM/pZgTd62xDEfYHLlP8Hibm7famYSGFEXQKdpgfUkK8sO6Y=
=m767
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Wed, 29 Nov 2017 07:25:13 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:59:09 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.