Updated libtiff packages fix security vulnerabilities
Publication date: 29 Dec 2018Modification date: 29 Dec 2018
Type: security
Affected Mageia releases : 6
CVE: CVE-2018-12900 , CVE-2018-18557 , CVE-2018-19210
Description
Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via a crafted TIFF file. (CVE-2018-12900) LibTIFF 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG into a buffer, ignoring the buffer size, which leads to a tif_jbig.c JBIGDecode out-of-bounds write. (CVE-2018-18557) In LibTIFF 4.0.9, there is a NULL pointer dereference in the TIFFWriteDirectorySec function in tif_dirwrite.c that will lead to a denial of service attack, as demonstrated by tiffset. (CVE-2018-19210)
References
- https://bugs.mageia.org/show_bug.cgi?id=24053
- https://www.debian.org/security/2018/dsa-4349
- https://lists.opensuse.org/opensuse-updates/2018-11/msg00138.html
- https://lists.opensuse.org/opensuse-updates/2018-12/msg00038.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12900
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18557
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19210
SRPMS
6/core
- libtiff-4.0.9-1.9.mga6