[USN-6229-1] LibTIFF vulnerabilities

Camila Camargo de Matos camila.camargodematos at canonical.com
Thu Jul 13 17:56:17 UTC 2023


==========================================================================
Ubuntu Security Notice USN-6229-1
July 13, 2023

tiff vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in LibTIFF.

Software Description:
- tiff: Tag Image File Format (TIFF) library

Details:

It was discovered that LibTIFF was not properly handling variables used to
perform memory management operations when processing an image through
tiffcrop, which could lead to a heap buffer overflow. An attacker could
possibly use this issue to cause a denial of service or execute arbitrary
code. (CVE-2023-25433, CVE-2023-26965)

It was discovered that LibTIFF was not properly processing numerical
values when dealing with little-endian input data, which could lead to the
execution of an invalid operation. An attacker could possibly use this
issue to cause a denial of service (CVE-2023-26966)

It was discovered that LibTIFF was not properly performing bounds checks
when closing a previously opened TIFF file, which could lead to a NULL
pointer dereference. An attacker could possibly use this issue to cause a
denial of service. (CVE-2023-3316)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
   libtiff-tools                   4.0.9-5ubuntu0.10+esm1
   libtiff5                        4.0.9-5ubuntu0.10+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
   libtiff-tools                   4.0.6-1ubuntu0.8+esm11
   libtiff5                        4.0.6-1ubuntu0.8+esm11

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
   libtiff-tools                   4.0.3-7ubuntu0.11+esm8
   libtiff5                        4.0.3-7ubuntu0.11+esm8

In general, a standard system update will make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-6229-1
   CVE-2023-25433, CVE-2023-26965, CVE-2023-26966, CVE-2023-3316

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 495 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20230713/be3823e7/attachment.sig>


More information about the ubuntu-security-announce mailing list