[USN-3864-1] LibTIFF vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”DmBMfCjLNeefaNweVooz5VjBdbCM4YCEy”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–DmBMfCjLNeefaNweVooz5VjBdbCM4YCEy

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3864-1] LibTIFF vulnerabilities

–eqmWYIrUJnhtMH8vKs8aMWl60wSUNw77N

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3864-1
January 22, 2019

tiff vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

LibTIFF could be made to crash or run programs as your login if it opened=
a
specially crafted file.

Software Description:
– tiff: Tag Image File Format (TIFF) library

Details:

It was discovered that LibTIFF incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a special=
ly
crafted image, a remote attacker could crash the application, leading to =
a
denial of service, or possibly execute arbitrary code with user privilege=
s.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
libtiff-tools 4.0.9-6ubuntu0.1
libtiff5 4.0.9-6ubuntu0.1

Ubuntu 18.04 LTS:
libtiff-tools 4.0.9-5ubuntu0.1
libtiff5 4.0.9-5ubuntu0.1

Ubuntu 16.04 LTS:
libtiff-tools 4.0.6-1ubuntu0.5
libtiff5 4.0.6-1ubuntu0.5

Ubuntu 14.04 LTS:
libtiff-tools 4.0.3-7ubuntu0.10
libtiff5 4.0.3-7ubuntu0.10

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3864-1
CVE-2018-10963, CVE-2018-17100, CVE-2018-17101, CVE-2018-18557,
CVE-2018-18661, CVE-2018-7456, CVE-2018-8905

Package Information:
https://launchpad.net/ubuntu/+source/tiff/4.0.9-6ubuntu0.1
https://launchpad.net/ubuntu/+source/tiff/4.0.9-5ubuntu0.1
https://launchpad.net/ubuntu/+source/tiff/4.0.6-1ubuntu0.5
https://launchpad.net/ubuntu/+source/tiff/4.0.3-7ubuntu0.10

–eqmWYIrUJnhtMH8vKs8aMWl60wSUNw77N–

–DmBMfCjLNeefaNweVooz5VjBdbCM4YCEy

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=cHLc
—–END PGP SIGNATURE—–

–DmBMfCjLNeefaNweVooz5VjBdbCM4YCEy–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK