Updated libtiff packages fix security vulnerabilities
Publication date: 29 Dec 2018Modification date: 29 Dec 2018
Type: security
Affected Mageia releases : 6
CVE: CVE-2018-12900 , CVE-2018-18557 , CVE-2018-19210
Description
Heap-based buffer overflow in the cpSeparateBufToContigBuf function in
tiffcp.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of
service (crash) or possibly have unspecified other impact via a crafted
TIFF file. (CVE-2018-12900)
LibTIFF 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG into a
buffer, ignoring the buffer size, which leads to a tif_jbig.c JBIGDecode
out-of-bounds write. (CVE-2018-18557)
In LibTIFF 4.0.9, there is a NULL pointer dereference in the
TIFFWriteDirectorySec function in tif_dirwrite.c that will lead to a
denial of service attack, as demonstrated by tiffset. (CVE-2018-19210)
References
- https://bugs.mageia.org/show_bug.cgi?id=24053
- https://www.debian.org/security/2018/dsa-4349
- https://lists.opensuse.org/opensuse-updates/2018-11/msg00138.html
- https://lists.opensuse.org/opensuse-updates/2018-12/msg00038.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12900
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18557
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19210
SRPMS
6/core
- libtiff-4.0.9-1.9.mga6