Your message dated Fri, 09 Feb 2018 23:49:08 +0000
with message-id <e1ekipk-0005fl...@fasolo.debian.org>
and subject line Bug#866109: fixed in tiff 4.0.8-2+deb9u2
has caused the Debian Bug report #866109,
regarding tiff: CVE-2017-9935: Heap-based buffer overflow in t2p_write_pdf
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
866109: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=866109
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: tiff
Version: 4.0.8-2
Severity: grave
Tags: upstream security
Forwarded: http://bugzilla.maptools.org/show_bug.cgi?id=2704
Hi,
the following vulnerability was published for tiff, using severity
grave for now since I'm not sure code execution can be ruled out.
CVE-2017-9935[0]:
| In LibTIFF 4.0.8, there is a heap-based buffer overflow in the
| t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could
| lead to different damages. For example, a crafted TIFF document can
| lead to an out-of-bounds read in TIFFCleanup, an invalid free in
| TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or
| a double free in t2p_free. Given these possibilities, it probably could
| cause arbitrary code execution.
In the upstream bugtracker the reporter has provided his reproducers
which can be used later on to verfiy a fix as well with the given
testcases.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-9935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9935
[1] http://bugzilla.maptools.org/show_bug.cgi?id=2704
Please adjust the affected versions in the BTS as needed, specifically
no checks have been done yet for older versions than 4.0.8-2.
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: tiff
Source-Version: 4.0.8-2+deb9u2
We believe that the bug you reported is fixed in the latest version of
tiff, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 866...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Laszlo Boszormenyi (GCS) <g...@debian.org> (supplier of updated tiff package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 30 Dec 2017 20:13:06 +0000
Source: tiff
Binary: libtiff5 libtiffxx5 libtiff5-dev libtiff-tools libtiff-opengl
libtiff-doc
Architecture: source all amd64
Version: 4.0.8-2+deb9u2
Distribution: stretch-security
Urgency: high
Maintainer: Laszlo Boszormenyi (GCS) <g...@debian.org>
Changed-By: Laszlo Boszormenyi (GCS) <g...@debian.org>
Description:
libtiff-doc - TIFF manipulation and conversion documentation
libtiff-opengl - TIFF manipulation and conversion tools
libtiff-tools - TIFF manipulation and conversion tools
libtiff5 - Tag Image File Format (TIFF) library
libtiff5-dev - Tag Image File Format library (TIFF), development files
libtiffxx5 - Tag Image File Format (TIFF) library -- C++ interface
Closes: 866109 868513 872607 873879 873880 885985
Changes:
tiff (4.0.8-2+deb9u2) stretch-security; urgency=high
.
* Fix CVE-2017-11335: heap based buffer write overflow in tiff2pdf
(closes: #868513).
* Fix CVE-2017-12944: OOM prevention in TIFFReadDirEntryArray()
(closes: #872607).
* Fix CVE-2017-13726: reachable assertion abort in TIFFWriteDirectorySec()
(closes: #873880).
* Fix CVE-2017-13727: reachable assertion abort in
TIFFWriteDirectoryTagSubifd() (closes: #873879).
* Fix CVE-2017-18013: NULL pointer dereference in TIFFPrintDirectory()
(closes: #885985).
* Fix CVE-2017-9935: heap-based buffer overflow in the t2p_write_pdf()
function (closes: #866109).
Checksums-Sha1:
7b8e353320028667b6d5320533d7ab6ed0974868 2185 tiff_4.0.8-2+deb9u2.dsc
34dfd38e29ab6c66d21ca7e4a388088b6e0e4b40 26252
tiff_4.0.8-2+deb9u2.debian.tar.xz
9000bc577b99dcbdc8ef5dde806c2adeb78d744a 395746
libtiff-doc_4.0.8-2+deb9u2_all.deb
70f0e4fab28528f4ff8cd8e3bb7fa7a98c68b6ae 14182
libtiff-opengl-dbgsym_4.0.8-2+deb9u2_amd64.deb
92c052e7a85e13273f363cee870c6d9dcb21cc2b 100320
libtiff-opengl_4.0.8-2+deb9u2_amd64.deb
84a4b3be06f2fda59ee153e72d6f9d7a80371003 351868
libtiff-tools-dbgsym_4.0.8-2+deb9u2_amd64.deb
c60b3176d060515d76b827f5806d68e6863f6929 281122
libtiff-tools_4.0.8-2+deb9u2_amd64.deb
c7a996fa1cb99d3d2c3259a3e08d743ea2b978a5 371778
libtiff5-dbgsym_4.0.8-2+deb9u2_amd64.deb
3615c374e61717f9bf2a8cd1dd5dd9e498abfbd8 360454
libtiff5-dev_4.0.8-2+deb9u2_amd64.deb
1b34836762c411b2c264426a12c0fbf035bdc419 237814
libtiff5_4.0.8-2+deb9u2_amd64.deb
6f3ac50cb436bd5a6497dcc14fb3c32b8c64f498 21044
libtiffxx5-dbgsym_4.0.8-2+deb9u2_amd64.deb
2269dab18fd163950c0d19792a3f1a24b0b37f3d 95620
libtiffxx5_4.0.8-2+deb9u2_amd64.deb
1e1f9cb575406ae5667bdda9229639d90a98b29d 10659
tiff_4.0.8-2+deb9u2_amd64.buildinfo
Checksums-Sha256:
b64056af722ac8826486c5361bce5e832347da02a7f7f5664d92c57b5b816ddf 2185
tiff_4.0.8-2+deb9u2.dsc
25fc9acaa503e454e40050a4fb6bca69bdce0f3d5eec5a08d8abe29b4f9584d9 26252
tiff_4.0.8-2+deb9u2.debian.tar.xz
ddba77d3a9e0d193a13e57bda811edd02ee551d46be697103aba3d8099e474af 395746
libtiff-doc_4.0.8-2+deb9u2_all.deb
0c346f50f1e0340fd2fbdcf7914be058c23ce762f9d0258b85ff6385a9f997a0 14182
libtiff-opengl-dbgsym_4.0.8-2+deb9u2_amd64.deb
87fbae83f470b92101df10aa984d71d9c5fce5c6da1a4a29bacea64ab6bd0414 100320
libtiff-opengl_4.0.8-2+deb9u2_amd64.deb
f6ace11f2dc10b47cbc789f200d68d7532ec217f56e15f6b07cb8cde99bfb42c 351868
libtiff-tools-dbgsym_4.0.8-2+deb9u2_amd64.deb
c68bb945d982edab0ca706d08f92516e92c1b1903c25d313d65080719acb4293 281122
libtiff-tools_4.0.8-2+deb9u2_amd64.deb
c9b1b912f965bf6c0a18e13b1aa1aa451eb1d824c5aeb2d08bfb55f759157fa0 371778
libtiff5-dbgsym_4.0.8-2+deb9u2_amd64.deb
50f0c22b0de9c9ed5186b7b6b5273e29438180683fab6016ec10f30995e297c9 360454
libtiff5-dev_4.0.8-2+deb9u2_amd64.deb
f07cf814bd48e50467aa31c70d67a19c1c1ff43a6c85f685c99bb7589348b74d 237814
libtiff5_4.0.8-2+deb9u2_amd64.deb
b52d73ca7ae7df2a69d3895b05a6eace541e6aef41936b3445811e64092b4ae1 21044
libtiffxx5-dbgsym_4.0.8-2+deb9u2_amd64.deb
daff2a977c2c900913d78649cdb747ee16888ffb3ca479dfac47a7f0b519f4f1 95620
libtiffxx5_4.0.8-2+deb9u2_amd64.deb
0daef45061fadcc87411fabe80b057d5146cc308379604a8526a4c0e9d99be78 10659
tiff_4.0.8-2+deb9u2_amd64.buildinfo
Files:
1c6352ae88a3bd5e084bb4fdf533dd10 2185 libs optional tiff_4.0.8-2+deb9u2.dsc
8a0484a21612098e9738bb15e563443f 26252 libs optional
tiff_4.0.8-2+deb9u2.debian.tar.xz
bd81dc15d542df10d803cb08a0582cd4 395746 doc optional
libtiff-doc_4.0.8-2+deb9u2_all.deb
93a223ddbb8c8156e00a48837a8c39f9 14182 debug extra
libtiff-opengl-dbgsym_4.0.8-2+deb9u2_amd64.deb
773216be66c54198706ae898d1024e96 100320 graphics optional
libtiff-opengl_4.0.8-2+deb9u2_amd64.deb
5a02365ff38e954142b4f63f82aafb27 351868 debug extra
libtiff-tools-dbgsym_4.0.8-2+deb9u2_amd64.deb
6ed2b2e46bd249fb458140dd8bd70054 281122 graphics optional
libtiff-tools_4.0.8-2+deb9u2_amd64.deb
74c12049f1d056c889ca8b8ff6fc4030 371778 debug extra
libtiff5-dbgsym_4.0.8-2+deb9u2_amd64.deb
31778ea681d7f5ea2d97ceae9b0291f9 360454 libdevel optional
libtiff5-dev_4.0.8-2+deb9u2_amd64.deb
dce21b072092d5565de8a4933a3741de 237814 libs optional
libtiff5_4.0.8-2+deb9u2_amd64.deb
1c7042a6a764d3b301008756260bcd2b 21044 debug extra
libtiffxx5-dbgsym_4.0.8-2+deb9u2_amd64.deb
1cfa6d7209474d5f632200b11b82eaad 95620 libs optional
libtiffxx5_4.0.8-2+deb9u2_amd64.deb
238e426d0391aa6eee7215257b091a69 10659 libs optional
tiff_4.0.8-2+deb9u2_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=iy1i
-----END PGP SIGNATURE-----
--- End Message ---