The updated packages fix libtiff security vulnerabilities
Publication date: 20 Oct 2016Modification date: 20 Oct 2016
Type: security
Affected Mageia releases : 5
CVE: CVE-2015-7554 , CVE-2015-8668 , CVE-2016-3186 , CVE-2016-3622 , CVE-2016-3623 , CVE-2016-3632 , CVE-2016-3945 , CVE-2016-3990 , CVE-2016-3991 , CVE-2016-5314 , CVE-2016-5315 , CVE-2016-5316 , CVE-2016-5317 , CVE-2016-5320 , CVE-2016-5321 , CVE-2016-5322 , CVE-2016-5323 , CVE-2016-5875 , CVE-2016-6223
Description
The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows
attackers to cause a denial of service (invalid memory write and
crash) or possibly have unspecified other impact via crafted field
data in an extension tag in a TIFF image. (CVE-2015-7554)
Heap-based buffer overflow in the PackBitsPreEncode function in
tif_packbits.c in bmp2tiff in libtiff 4.0.6 and earlier allows remote
attackers to execute arbitrary code or cause a denial of service via a
large width field in a BMP image. (CVE-2015-8668)
Buffer overflow in the readextension function in gif2tiff.c in LibTIFF
4.0.6 allows remote attackers to cause a denial of service (application
crash) via a crafted GIF file. (CVE-2016-3186) (the program gif2tiff has
been obsoleted)
The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6
and earlier allows remote attackers to cause a denial of service
(divide-by-zero error) via a crafted TIFF image. (CVE-2016-3622)
The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers
to cause a denial of service (divide-by-zero) by setting the (1) v or (2)
h parameter to 0. (CVE-2016-3623)
The _TIFFVGetField function in tif_dirinfo.c in LibTIFF 4.0.6 and earlier
allows remote attackers to cause a denial of service (out-of-bounds write)
or execute arbitrary code via a crafted TIFF image. (CVE-2016-3632)
Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile
functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode
is enabled,allow remote attackers to cause a denial of service (crash) or
execute arbitrary code via a crafted TIFF image, which triggers an
out-of-bounds write. (CVE-2016-3945)
Heap-based buffer overflow in the horizontalDifference8 function in
tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers
to cause a denial of service (crash) or execute arbitrary code via
a crafted TIFF image to tiffcp. (CVE-2016-3990)
Heap-based buffer overflow in the loadImage function in the tiffcrop tool
in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of
service (out-of-bounds write) or execute arbitrary code via a crafted TIFF
image with zero tiles. (CVE-2016-3991)
PixarLogDecode() out-of-bound writes (CVE-2016-5314)
tif_dir.c: setByteArray() Read access violation (CVE-2016-5315)
tif_pixarlog.c: PixarLogCleanup() Segmentation fault (CVE-2016-5316)
crash occurs when generating a thumbnail for a crafted TIFF image
(CVE-2016-5317)
rgb2ycbcr: command excution (CVE-2016-5320)
DumpModeDecode(): Ddos (CVE-2016-5321)
tiffcrop: extractContigSamplesBytes: out-of-bounds read (CVE-2016-5322)
tiffcrop _TIFFFax3fillruns(): divide by zero (CVE-2016-5323)
tiff: heap-based buffer overflow when using the PixarLog compression format (CVE-2016-5875)
tiff: information leak in libtiff/tif_read.c (CVE-2016-6223)
References
- https://bugs.mageia.org/show_bug.cgi?id=17480
- http://openwall.com/lists/oss-security/2015/12/26/7
- https://lists.opensuse.org/opensuse-updates/2016-04/msg00064.html
- http://openwall.com/lists/oss-security/2016/07/14/4
- http://lwn.net/Vulnerabilities/695692/
- https://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html
- https://rhn.redhat.com/errata/RHSA-2016-1546.html
- http://lwn.net/Vulnerabilities/696207/
- http://lwn.net/Vulnerabilities/698795/
- http://lwn.net/Vulnerabilities/699684/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7554
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8668
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3186
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3632
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5320
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5875
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223
SRPMS
5/core
- libtiff-4.0.6-1.4.mga5