File _patchinfo of Package patchinfo.7550
<patchinfo incident="7550">
<issue id="1082825" tracker="bnc">VUL-0: CVE-2018-7456: tiff: A NULL Pointer Dereference occurs in the function TIFFPrintDirectory intif_print.c when using the tiffinfo tool to print crafted TIFFinformation, a different vulnerability than CVE-2017-18013.</issue>
<issue id="2018-7456" tracker="cve" />
<issue id="1092949" tracker="bnc">VUL-1: CVE-2018-10963: tiff: The TIFFWriteDirectorySec() function in tif_dirwrite.c allows remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file</issue>
<issue id="1074317" tracker="bnc">VUL-0: CVE-2017-18013: tiff: A Null-Pointer Dereference in the tif_print.cTIFFPrintDirectory function, could lead to denial of service</issue>
<issue id="1082332" tracker="bnc">VUL-1: CVE-2017-11613: tiff: denial of service in TIFFOpen function</issue>
<issue id="1086408" tracker="bnc">VUL-0: CVE-2018-8905: tiff: A heap-based buffer overflow occurs in the functionLZWDecodeCompat in tif_lzw.c via a crafted TIFF file, as demonstrated bytiff2ps.</issue>
<issue id="2018-8905" tracker="cve" />
<issue id="2017-11613" tracker="cve" />
<issue id="2018-10963" tracker="cve" />
<issue id="2017-18013" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>mvetter</packager>
<description>This update for tiff fixes the following security issues:
These security issues were fixed:
- CVE-2017-18013: Fixed a NULL pointer dereference in the
tif_print.cTIFFPrintDirectory function that could have lead to denial of
service (bsc#1074317).
- CVE-2018-10963: Fixed an assertion failure in the TIFFWriteDirectorySec()
function in tif_dirwrite.c, which allowed remote attackers to cause a denial
of service via a crafted file (bsc#1092949).
- CVE-2018-7456: Prevent a NULL Pointer dereference in the function
TIFFPrintDirectory when using the tiffinfo tool to print crafted TIFF
information, a different vulnerability than CVE-2017-18013 (bsc#1082825).
- CVE-2017-11613: Prevent denial of service in the TIFFOpen function. During
the TIFFOpen process, td_imagelength is not checked. The value of
td_imagelength can be directly controlled by an input file. In the
ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called
based on td_imagelength. If the value of td_imagelength is set close to the
amount of system memory, it will hang the system or trigger the OOM killer
(bsc#1082332).
- CVE-2018-8905: Prevent heap-based buffer overflow in the function
LZWDecodeCompat via a crafted TIFF file (bsc#1086408).
</description>
<summary>Security update for tiff</summary>
</patchinfo>