[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

tiff / CVE-2014-8127 / CVE-2018-5360



According to https://security-tracker.debian.org/tracker/CVE-2014-8127:

tiff 4.0.3-12.3+deb8u5 is vulnerable to CVE-2014-8127.

But according to the changelog CVE-2014-8127 was fixed in version
4.0.3-12.3+deb8u3:

tiff (4.0.3-12.3+deb8u3) jessie-security; urgency=high

  * Backport fix for the following vulnerabilities:
    - CVE-2014-8127 and CVE-2016-3658: out-of-bounds read in the tiffset tool,
    - CVE-2016-9535: replace assertions by runtime checks to avoid assertions
      in debug mode, or buffer overflows in release mode,
    - CVE-2016-10266: divide-by-zero in TIFFReadEncodedStrip,
    - CVE-2016-10267: divide-by-zero in OJPEGDecodeRaw,
    - CVE-2016-10269: heap-based buffer overflow in _TIFFmemcpy,
    - CVE-2016-10270: heap-based buffer overflow in TIFFFillStrip,
    - CVE-2017-5225: heap buffer overflow via a crafted BitsPerSample value,
    - CVE-2017-7592: left-shift undefined behavior issue in putagreytile,
    - CVE-2017-7593: unitialized-memory access from tif_rawdata,
    - CVE-2017-7594: leak in OJPEGReadHeaderInfoSecTablesAcTable,
    - CVE-2017-7595: divide-by-zero in JPEGSetupEncode,
    - CVE-2017-7596, CVE-2017-7597, CVE-2017-7598, CVE-2017-7599,
      CVE-2017-7600, CVE-2017-7601 and CVE-2017-7602: multiple UBSAN crashes.
  * Add required _TIFFcalloc@LIBTIFF_4.0 symbol to the libtiff5 package.

  [ Tobias Lippert <lippertto_oss@fastmail.com> ]
  * Fix a regression introduced by patch CVE-2014-8128-5 where enabling
    compression of tif files results in corrupt files
    (closes: #783555, #818360).

 -- Laszlo Boszormenyi (GCS) <gcs@debian.org>  Fri, 21 Apr 2017 20:22:02 +0000

I see this DSA, maybe somebody missed this CVE when uploading?

https://security-tracker.debian.org/tracker/DSA-3844-1

Just checking here, just in case there was some other reason...
-- 
Brian May <brian@linuxpenguins.xyz>
https://linuxpenguins.xyz/brian/


Reply to: