Red Hat Security Advisory 2016-1547-01 - The libtiff packages contain a library of functions for manipulating Tagged Image File Format files. Security Fix: Multiple flaws have been discovered in libtiff. A remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code by tricking an application linked against libtiff into processing specially crafted files.
ed518f90e6c9ad3adf207b0b3d18c196fe24aa28b1fe7abacc185d48bfa46c88
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Important: libtiff security update
Advisory ID: RHSA-2016:1547-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1547.html
Issue date: 2016-08-02
CVE Names: CVE-2014-8127 CVE-2014-8129 CVE-2014-8130
CVE-2014-9330 CVE-2014-9655 CVE-2015-1547
CVE-2015-7554 CVE-2015-8665 CVE-2015-8668
CVE-2015-8683 CVE-2015-8781 CVE-2015-8782
CVE-2015-8783 CVE-2015-8784 CVE-2016-3632
CVE-2016-3945 CVE-2016-3990 CVE-2016-3991
CVE-2016-5320
=====================================================================
1. Summary:
An update for libtiff is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
3. Description:
The libtiff packages contain a library of functions for manipulating Tagged
Image File Format (TIFF) files.
Security Fix(es):
* Multiple flaws have been discovered in libtiff. A remote attacker could
exploit these flaws to cause a crash or memory corruption and, possibly,
execute arbitrary code by tricking an application linked against libtiff
into processing specially crafted files. (CVE-2014-9655, CVE-2015-1547,
CVE-2015-8784, CVE-2015-8683, CVE-2015-8665, CVE-2015-8781, CVE-2015-8782,
CVE-2015-8783, CVE-2016-3990, CVE-2016-5320)
* Multiple flaws have been discovered in various libtiff tools (bmp2tiff,
pal2rgb, thumbnail, tiff2bw, tiff2pdf, tiffcrop, tiffdither, tiffsplit,
tiff2rgba). By tricking a user into processing a specially crafted file, a
remote attacker could exploit these flaws to cause a crash or memory
corruption and, possibly, execute arbitrary code with the privileges of the
user running the libtiff tool. (CVE-2014-8127, CVE-2014-8129,
CVE-2014-8130, CVE-2014-9330, CVE-2015-7554, CVE-2015-8668, CVE-2016-3632,
CVE-2016-3945, CVE-2016-3991)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
All running applications linked against libtiff must be restarted for this
update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1177893 - CVE-2014-9330 libtiff: Out-of-bounds reads followed by a crash in bmp2tiff
1185805 - CVE-2014-8127 libtiff: out-of-bounds read with malformed TIFF image in multiple tools
1185815 - CVE-2014-8129 libtiff: out-of-bounds read/write with malformed TIFF image in tiff2pdf
1185817 - CVE-2014-8130 libtiff: divide by zero in the tiffdither tool
1190703 - CVE-2014-9655 libtiff: use of uninitialized memory in putcontig8bitYCbCr21tile and NeXTDecode
1190709 - CVE-2015-1547 libtiff: use of uninitialized memory in NeXTDecode
1294417 - CVE-2015-7554 libtiff: Invalid-write in _TIFFVGetField() when parsing some extension tags
1294425 - CVE-2015-8668 libtiff: OOB read in bmp2tiff
1294427 - CVE-2015-8683 libtiff: Out-of-bounds when reading CIE Lab image format files
1294444 - CVE-2015-8665 libtiff: Out-of-bounds read in tif_getimage.c
1301649 - CVE-2015-8781 CVE-2015-8782 CVE-2015-8783 libtiff: invalid assertion
1301652 - CVE-2015-8784 libtiff: out-of-bound write in NeXTDecode()
1325093 - CVE-2016-3945 libtiff: out-of-bounds write in the tiff2rgba tool
1325095 - CVE-2016-3632 libtiff: out-of-bounds write in _TIFFVGetField function
1326246 - CVE-2016-3990 libtiff: out-of-bounds write in horizontalDifference8()
1326249 - CVE-2016-3991 libtiff: out-of-bounds write in loadImage() function
1346687 - CVE-2016-5320 libtiff: Out-of-bounds write in PixarLogDecode() function in tif_pixarlog.c
6. Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source:
libtiff-3.9.4-18.el6_8.src.rpm
i386:
libtiff-3.9.4-18.el6_8.i686.rpm
libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm
x86_64:
libtiff-3.9.4-18.el6_8.i686.rpm
libtiff-3.9.4-18.el6_8.x86_64.rpm
libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm
libtiff-debuginfo-3.9.4-18.el6_8.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386:
libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm
libtiff-devel-3.9.4-18.el6_8.i686.rpm
libtiff-static-3.9.4-18.el6_8.i686.rpm
x86_64:
libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm
libtiff-debuginfo-3.9.4-18.el6_8.x86_64.rpm
libtiff-devel-3.9.4-18.el6_8.i686.rpm
libtiff-devel-3.9.4-18.el6_8.x86_64.rpm
libtiff-static-3.9.4-18.el6_8.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source:
libtiff-3.9.4-18.el6_8.src.rpm
x86_64:
libtiff-3.9.4-18.el6_8.i686.rpm
libtiff-3.9.4-18.el6_8.x86_64.rpm
libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm
libtiff-debuginfo-3.9.4-18.el6_8.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64:
libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm
libtiff-debuginfo-3.9.4-18.el6_8.x86_64.rpm
libtiff-devel-3.9.4-18.el6_8.i686.rpm
libtiff-devel-3.9.4-18.el6_8.x86_64.rpm
libtiff-static-3.9.4-18.el6_8.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
libtiff-3.9.4-18.el6_8.src.rpm
i386:
libtiff-3.9.4-18.el6_8.i686.rpm
libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm
libtiff-devel-3.9.4-18.el6_8.i686.rpm
ppc64:
libtiff-3.9.4-18.el6_8.ppc.rpm
libtiff-3.9.4-18.el6_8.ppc64.rpm
libtiff-debuginfo-3.9.4-18.el6_8.ppc.rpm
libtiff-debuginfo-3.9.4-18.el6_8.ppc64.rpm
libtiff-devel-3.9.4-18.el6_8.ppc.rpm
libtiff-devel-3.9.4-18.el6_8.ppc64.rpm
s390x:
libtiff-3.9.4-18.el6_8.s390.rpm
libtiff-3.9.4-18.el6_8.s390x.rpm
libtiff-debuginfo-3.9.4-18.el6_8.s390.rpm
libtiff-debuginfo-3.9.4-18.el6_8.s390x.rpm
libtiff-devel-3.9.4-18.el6_8.s390.rpm
libtiff-devel-3.9.4-18.el6_8.s390x.rpm
x86_64:
libtiff-3.9.4-18.el6_8.i686.rpm
libtiff-3.9.4-18.el6_8.x86_64.rpm
libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm
libtiff-debuginfo-3.9.4-18.el6_8.x86_64.rpm
libtiff-devel-3.9.4-18.el6_8.i686.rpm
libtiff-devel-3.9.4-18.el6_8.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386:
libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm
libtiff-static-3.9.4-18.el6_8.i686.rpm
ppc64:
libtiff-debuginfo-3.9.4-18.el6_8.ppc64.rpm
libtiff-static-3.9.4-18.el6_8.ppc64.rpm
s390x:
libtiff-debuginfo-3.9.4-18.el6_8.s390x.rpm
libtiff-static-3.9.4-18.el6_8.s390x.rpm
x86_64:
libtiff-debuginfo-3.9.4-18.el6_8.x86_64.rpm
libtiff-static-3.9.4-18.el6_8.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
libtiff-3.9.4-18.el6_8.src.rpm
i386:
libtiff-3.9.4-18.el6_8.i686.rpm
libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm
libtiff-devel-3.9.4-18.el6_8.i686.rpm
x86_64:
libtiff-3.9.4-18.el6_8.i686.rpm
libtiff-3.9.4-18.el6_8.x86_64.rpm
libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm
libtiff-debuginfo-3.9.4-18.el6_8.x86_64.rpm
libtiff-devel-3.9.4-18.el6_8.i686.rpm
libtiff-devel-3.9.4-18.el6_8.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386:
libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm
libtiff-static-3.9.4-18.el6_8.i686.rpm
x86_64:
libtiff-debuginfo-3.9.4-18.el6_8.x86_64.rpm
libtiff-static-3.9.4-18.el6_8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-8127
https://access.redhat.com/security/cve/CVE-2014-8129
https://access.redhat.com/security/cve/CVE-2014-8130
https://access.redhat.com/security/cve/CVE-2014-9330
https://access.redhat.com/security/cve/CVE-2014-9655
https://access.redhat.com/security/cve/CVE-2015-1547
https://access.redhat.com/security/cve/CVE-2015-7554
https://access.redhat.com/security/cve/CVE-2015-8665
https://access.redhat.com/security/cve/CVE-2015-8668
https://access.redhat.com/security/cve/CVE-2015-8683
https://access.redhat.com/security/cve/CVE-2015-8781
https://access.redhat.com/security/cve/CVE-2015-8782
https://access.redhat.com/security/cve/CVE-2015-8783
https://access.redhat.com/security/cve/CVE-2015-8784
https://access.redhat.com/security/cve/CVE-2016-3632
https://access.redhat.com/security/cve/CVE-2016-3945
https://access.redhat.com/security/cve/CVE-2016-3990
https://access.redhat.com/security/cve/CVE-2016-3991
https://access.redhat.com/security/cve/CVE-2016-5320
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFXoNKeXlSAg2UNWIIRAsVZAJ940rmw6jTuzv+WQ7T1G+tfn9S1GQCgnVTY
Fsfa3CmoWEoMPE+ZNQBpeTQ=
=vyQ/
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce