[USN-3906-1] LibTIFF vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”fKxOqiwcQq3YLX02Xq6CwyZQ2hA5Sw4Mf”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–fKxOqiwcQq3YLX02Xq6CwyZQ2hA5Sw4Mf

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3906-1] LibTIFF vulnerabilities

–BRbxgfSP2BJWxcKBo1EDb8eyeFRkzyGqr

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3906-1
March 12, 2019

tiff vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

LibTIFF could be made to crash or run programs as your login if it opened=
a
specially crafted file.

Software Description:
– tiff: Tag Image File Format (TIFF) library

Details:

It was discovered that LibTIFF incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a special=
ly
crafted image, a remote attacker could crash the application, leading to =
a
denial of service, or possibly execute arbitrary code with user privilege=
s.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
libtiff-tools 4.0.9-6ubuntu0.2
libtiff5 4.0.9-6ubuntu0.2

Ubuntu 18.04 LTS:
libtiff-tools 4.0.9-5ubuntu0.2
libtiff5 4.0.9-5ubuntu0.2

Ubuntu 16.04 LTS:
libtiff-tools 4.0.6-1ubuntu0.6
libtiff5 4.0.6-1ubuntu0.6

Ubuntu 14.04 LTS:
libtiff-tools 4.0.3-7ubuntu0.11
libtiff5 4.0.3-7ubuntu0.11

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3906-1
CVE-2018-10779, CVE-2018-12900, CVE-2018-17000, CVE-2018-19210,
CVE-2019-6128, CVE-2019-7663

Package Information:
https://launchpad.net/ubuntu/+source/tiff/4.0.9-6ubuntu0.2
https://launchpad.net/ubuntu/+source/tiff/4.0.9-5ubuntu0.2
https://launchpad.net/ubuntu/+source/tiff/4.0.6-1ubuntu0.6
https://launchpad.net/ubuntu/+source/tiff/4.0.3-7ubuntu0.11

–BRbxgfSP2BJWxcKBo1EDb8eyeFRkzyGqr–

–fKxOqiwcQq3YLX02Xq6CwyZQ2hA5Sw4Mf

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=qVij
—–END PGP SIGNATURE—–

–fKxOqiwcQq3YLX02Xq6CwyZQ2hA5Sw4Mf–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK