Your message dated Sat, 10 Feb 2018 21:09:40 +0000
with message-id <e1ekcoy-000d6t...@fasolo.debian.org>
and subject line Bug#866109: fixed in tiff 4.0.3-12.3+deb8u5
has caused the Debian Bug report #866109,
regarding tiff: CVE-2017-9935: Heap-based buffer overflow in t2p_write_pdf
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
866109: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=866109
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: tiff
Version: 4.0.8-2
Severity: grave
Tags: upstream security
Forwarded: http://bugzilla.maptools.org/show_bug.cgi?id=2704
Hi,
the following vulnerability was published for tiff, using severity
grave for now since I'm not sure code execution can be ruled out.
CVE-2017-9935[0]:
| In LibTIFF 4.0.8, there is a heap-based buffer overflow in the
| t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could
| lead to different damages. For example, a crafted TIFF document can
| lead to an out-of-bounds read in TIFFCleanup, an invalid free in
| TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or
| a double free in t2p_free. Given these possibilities, it probably could
| cause arbitrary code execution.
In the upstream bugtracker the reporter has provided his reproducers
which can be used later on to verfiy a fix as well with the given
testcases.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-9935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9935
[1] http://bugzilla.maptools.org/show_bug.cgi?id=2704
Please adjust the affected versions in the BTS as needed, specifically
no checks have been done yet for older versions than 4.0.8-2.
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: tiff
Source-Version: 4.0.3-12.3+deb8u5
We believe that the bug you reported is fixed in the latest version of
tiff, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 866...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Moritz Muehlenhoff <j...@debian.org> (supplier of updated tiff package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 26 Jan 2018 20:53:45 +0000
Source: tiff
Binary: libtiff5 libtiffxx5 libtiff5-dev libtiff-tools libtiff-opengl
libtiff-doc
Architecture: source all amd64
Version: 4.0.3-12.3+deb8u5
Distribution: jessie-security
Urgency: high
Maintainer: Ondřej Surý <ond...@debian.org>
Changed-By: Moritz Muehlenhoff <j...@debian.org>
Description:
libtiff-doc - TIFF manipulation and conversion documentation
libtiff-opengl - TIFF manipulation and conversion tools
libtiff-tools - TIFF manipulation and conversion tools
libtiff5 - Tag Image File Format (TIFF) library
libtiff5-dev - Tag Image File Format library (TIFF), development files
libtiffxx5 - Tag Image File Format (TIFF) library -- C++ interface
Closes: 866109 868513 872607 873879 873880 885985
Changes:
tiff (4.0.3-12.3+deb8u5) jessie-security; urgency=high
.
[ Laszlo Boszormenyi (GCS) ]
* Fix CVE-2017-11335: heap based buffer write overflow in tiff2pdf
(closes: #868513).
* Fix CVE-2017-12944: OOM prevention in TIFFReadDirEntryArray()
(closes: #872607).
* Fix CVE-2017-13726: reachable assertion abort in TIFFWriteDirectorySec()
(closes: #873880).
* Fix CVE-2017-13727: reachable assertion abort in
TIFFWriteDirectoryTagSubifd() (closes: #873879).
* Fix CVE-2017-18013: NULL pointer dereference in TIFFPrintDirectory()
(closes: #885985).
* Fix CVE-2017-9935: heap-based buffer overflow in the t2p_write_pdf()
function (closes: #866109).
.
[ Moritz Muehlenhoff ]
* CVE-2016-10371
Checksums-Sha1:
5286070ac9dad8f79a58dce68a6f5d5a5709a43a 2240 tiff_4.0.3-12.3+deb8u5.dsc
3b5963a07b791621522bb9864ef59d9cd2c41296 63224
tiff_4.0.3-12.3+deb8u5.debian.tar.xz
2f2b14c7d1d8d381fcdd8158cf1ab3a1c31ae519 370430
libtiff-doc_4.0.3-12.3+deb8u5_all.deb
c3427c5d04e4ed47bcafa2b7a3c59e1fa90295e3 221468
libtiff5_4.0.3-12.3+deb8u5_amd64.deb
785743a2a3392106c8095442a518d45d74a313d7 80930
libtiffxx5_4.0.3-12.3+deb8u5_amd64.deb
b4559d4bb6582933deb0a0e906cfc54eeaba7f2d 343556
libtiff5-dev_4.0.3-12.3+deb8u5_amd64.deb
ed40c22817692b79a05dd5d2420aa132a8a8f571 274274
libtiff-tools_4.0.3-12.3+deb8u5_amd64.deb
81db38b5f8ba38422716eeacfd6da919b1bf08a8 85868
libtiff-opengl_4.0.3-12.3+deb8u5_amd64.deb
Checksums-Sha256:
69fe805e2304bc369b2200636988cb7bd5d38f6e0daf9ad0eaaf96ffaea8d464 2240
tiff_4.0.3-12.3+deb8u5.dsc
d43190b75bb70c05701afc8c061f49c75433b5d9965fd57df68e334195b267c4 63224
tiff_4.0.3-12.3+deb8u5.debian.tar.xz
46dda733fe0b9206c41cfd11b1aaa823bbcf971c5300edaabc976ff17cb16609 370430
libtiff-doc_4.0.3-12.3+deb8u5_all.deb
2bdb12e49dd579e1ad8f27c709efff9ed2578560b235ec964ffba82459423834 221468
libtiff5_4.0.3-12.3+deb8u5_amd64.deb
bfe0fb6f79fae2901b5b12d0cd68b6598528f2e01585e96eb053ce0a97c6a4ca 80930
libtiffxx5_4.0.3-12.3+deb8u5_amd64.deb
c2609f6341939315cbbfdf6c4d7ccaeb2372002763ccc6ec94299d518fad7b95 343556
libtiff5-dev_4.0.3-12.3+deb8u5_amd64.deb
5af7bea70a18bbcfd98ee0b78c1c687fd6d855a69daa3d4a1eea7dabdf6fb777 274274
libtiff-tools_4.0.3-12.3+deb8u5_amd64.deb
4f627fb090becf70f3c94ca9305b52db93645603fa6c9406236202969bb624f6 85868
libtiff-opengl_4.0.3-12.3+deb8u5_amd64.deb
Files:
10f0251f4045702e0880d89b54df8568 2240 libs optional tiff_4.0.3-12.3+deb8u5.dsc
17d67f197d3f6b8e45081f3f2c2ef67d 63224 libs optional
tiff_4.0.3-12.3+deb8u5.debian.tar.xz
f5fdd9aba64b15b8d1155e34e70a2e5c 370430 doc optional
libtiff-doc_4.0.3-12.3+deb8u5_all.deb
5ebd46638fd112f5ef610d6cf2ed6234 221468 libs optional
libtiff5_4.0.3-12.3+deb8u5_amd64.deb
b6b610757f2ef0226da8cae5774b6ae5 80930 libs optional
libtiffxx5_4.0.3-12.3+deb8u5_amd64.deb
6d6f84d18cf1e20178dd1e7d9d07add6 343556 libdevel optional
libtiff5-dev_4.0.3-12.3+deb8u5_amd64.deb
92a9a989d700fe995da70fa3d9618fe7 274274 graphics optional
libtiff-tools_4.0.3-12.3+deb8u5_amd64.deb
9aa51919e9edc1edd7bce248084f2822 85868 graphics optional
libtiff-opengl_4.0.3-12.3+deb8u5_amd64.deb
-----BEGIN PGP SIGNATURE-----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=n2QL
-----END PGP SIGNATURE-----
--- End Message ---