USN-6229-1: LibTIFF vulnerabilities
13 July 2023
Several security issues were fixed in LibTIFF.
Releases
Packages
- tiff - Tag Image File Format (TIFF) library
Details
It was discovered that LibTIFF was not properly handling variables used to
perform memory management operations when processing an image through
tiffcrop, which could lead to a heap buffer overflow. An attacker could
possibly use this issue to cause a denial of service or execute arbitrary
code. (CVE-2023-25433, CVE-2023-26965)
It was discovered that LibTIFF was not properly processing numerical
values when dealing with little-endian input data, which could lead to the
execution of an invalid operation. An attacker could possibly use this
issue to cause a denial of service (CVE-2023-26966)
It was discovered that LibTIFF was not properly performing bounds checks
when closing a previously opened TIFF file, which could lead to a NULL
pointer dereference. An attacker could possibly use this issue to cause a
denial of service. (CVE-2023-3316)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
libtiff5
-
4.0.9-5ubuntu0.10+esm1
Available with Ubuntu Pro
-
libtiff-tools
-
4.0.9-5ubuntu0.10+esm1
Available with Ubuntu Pro
Ubuntu 16.04
-
libtiff5
-
4.0.6-1ubuntu0.8+esm11
Available with Ubuntu Pro
-
libtiff-tools
-
4.0.6-1ubuntu0.8+esm11
Available with Ubuntu Pro
Ubuntu 14.04
-
libtiff5
-
4.0.3-7ubuntu0.11+esm8
Available with Ubuntu Pro
-
libtiff-tools
-
4.0.3-7ubuntu0.11+esm8
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6290-1: libtiffxx6, libtiff-tools, libtiff5-alt-dev, tiff, libtiff4-dev, libtiff6, libtiff-doc, libtiffxx5, libtiff5-dev, libtiff-opengl, libtiff5, libtiff-dev