RedHat: RHSA-2019-2053:01 Moderate: libtiff security update
Summary
The libtiff packages contain a library of functions for manipulating Tagged
Image File Format (TIFF) files.
Security Fix(es):
* libtiff: buffer overflow in gif2tiff (CVE-2016-3186)
* libtiff: Heap-based buffer overflow in the cpSeparateBufToContigBuf
function resulting in a denial of service or possibly code execution
(CVE-2018-12900)
* libtiff: Out-of-bounds write in tif_jbig.c (CVE-2018-18557)
* libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory()
causes a denial of service (CVE-2018-7456)
* libtiff: heap-based buffer overflow in tif_lzw.c:LZWDecodeCompat() allows
for denial of service (CVE-2018-8905)
* libtiff: heap-based buffer over-read in TIFFWriteScanline function in
tif_write.c (CVE-2018-10779)
* libtiff: reachable assertion in TIFFWriteDirectorySec function in
tif_dirwrite.c (CVE-2018-10963)
* libtiff: Integer overflow in multiply_ms in tools/ppm2tiff.c
(CVE-2018-17100)
* libtiff: Two out-of-bounds writes in cpTags in tools/tiff2bw.c and
tools/pal2rgb.c (CVE-2018-17101)
* libtiff: tiff2bw tool failed memory allocation leads to crash
(CVE-2018-18661)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.7 Release Notes linked from the References section.
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
All running applications linked against libtiff must be restarted for this
update to take effect.
References
https://access.redhat.com/security/cve/CVE-2016-3186 https://access.redhat.com/security/cve/CVE-2018-7456 https://access.redhat.com/security/cve/CVE-2018-8905 https://access.redhat.com/security/cve/CVE-2018-10779 https://access.redhat.com/security/cve/CVE-2018-10963 https://access.redhat.com/security/cve/CVE-2018-12900 https://access.redhat.com/security/cve/CVE-2018-17100 https://access.redhat.com/security/cve/CVE-2018-17101 https://access.redhat.com/security/cve/CVE-2018-18557 https://access.redhat.com/security/cve/CVE-2018-18661 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html-single/7.7_release_notes/index
Package List
Red Hat Enterprise Linux Client (v. 7):
Source:
libtiff-4.0.3-32.el7.src.rpm
x86_64:
libtiff-4.0.3-32.el7.i686.rpm
libtiff-4.0.3-32.el7.x86_64.rpm
libtiff-debuginfo-4.0.3-32.el7.i686.rpm
libtiff-debuginfo-4.0.3-32.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
libtiff-debuginfo-4.0.3-32.el7.i686.rpm
libtiff-debuginfo-4.0.3-32.el7.x86_64.rpm
libtiff-devel-4.0.3-32.el7.i686.rpm
libtiff-devel-4.0.3-32.el7.x86_64.rpm
libtiff-static-4.0.3-32.el7.i686.rpm
libtiff-static-4.0.3-32.el7.x86_64.rpm
libtiff-tools-4.0.3-32.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
libtiff-4.0.3-32.el7.src.rpm
x86_64:
libtiff-4.0.3-32.el7.i686.rpm
libtiff-4.0.3-32.el7.x86_64.rpm
libtiff-debuginfo-4.0.3-32.el7.i686.rpm
libtiff-debuginfo-4.0.3-32.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
libtiff-debuginfo-4.0.3-32.el7.i686.rpm
libtiff-debuginfo-4.0.3-32.el7.x86_64.rpm
libtiff-devel-4.0.3-32.el7.i686.rpm
libtiff-devel-4.0.3-32.el7.x86_64.rpm
libtiff-static-4.0.3-32.el7.i686.rpm
libtiff-static-4.0.3-32.el7.x86_64.rpm
libtiff-tools-4.0.3-32.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
libtiff-4.0.3-32.el7.src.rpm
ppc64:
libtiff-4.0.3-32.el7.ppc.rpm
libtiff-4.0.3-32.el7.ppc64.rpm
libtiff-debuginfo-4.0.3-32.el7.ppc.rpm
libtiff-debuginfo-4.0.3-32.el7.ppc64.rpm
libtiff-devel-4.0.3-32.el7.ppc.rpm
libtiff-devel-4.0.3-32.el7.ppc64.rpm
ppc64le:
libtiff-4.0.3-32.el7.ppc64le.rpm
libtiff-debuginfo-4.0.3-32.el7.ppc64le.rpm
libtiff-devel-4.0.3-32.el7.ppc64le.rpm
s390x:
libtiff-4.0.3-32.el7.s390.rpm
libtiff-4.0.3-32.el7.s390x.rpm
libtiff-debuginfo-4.0.3-32.el7.s390.rpm
libtiff-debuginfo-4.0.3-32.el7.s390x.rpm
libtiff-devel-4.0.3-32.el7.s390.rpm
libtiff-devel-4.0.3-32.el7.s390x.rpm
x86_64:
libtiff-4.0.3-32.el7.i686.rpm
libtiff-4.0.3-32.el7.x86_64.rpm
libtiff-debuginfo-4.0.3-32.el7.i686.rpm
libtiff-debuginfo-4.0.3-32.el7.x86_64.rpm
libtiff-devel-4.0.3-32.el7.i686.rpm
libtiff-devel-4.0.3-32.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
libtiff-debuginfo-4.0.3-32.el7.ppc.rpm
libtiff-debuginfo-4.0.3-32.el7.ppc64.rpm
libtiff-static-4.0.3-32.el7.ppc.rpm
libtiff-static-4.0.3-32.el7.ppc64.rpm
libtiff-tools-4.0.3-32.el7.ppc64.rpm
ppc64le:
libtiff-debuginfo-4.0.3-32.el7.ppc64le.rpm
libtiff-static-4.0.3-32.el7.ppc64le.rpm
libtiff-tools-4.0.3-32.el7.ppc64le.rpm
s390x:
libtiff-debuginfo-4.0.3-32.el7.s390.rpm
libtiff-debuginfo-4.0.3-32.el7.s390x.rpm
libtiff-static-4.0.3-32.el7.s390.rpm
libtiff-static-4.0.3-32.el7.s390x.rpm
libtiff-tools-4.0.3-32.el7.s390x.rpm
x86_64:
libtiff-debuginfo-4.0.3-32.el7.i686.rpm
libtiff-debuginfo-4.0.3-32.el7.x86_64.rpm
libtiff-static-4.0.3-32.el7.i686.rpm
libtiff-static-4.0.3-32.el7.x86_64.rpm
libtiff-tools-4.0.3-32.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
libtiff-4.0.3-32.el7.src.rpm
x86_64:
libtiff-4.0.3-32.el7.i686.rpm
libtiff-4.0.3-32.el7.x86_64.rpm
libtiff-debuginfo-4.0.3-32.el7.i686.rpm
libtiff-debuginfo-4.0.3-32.el7.x86_64.rpm
libtiff-devel-4.0.3-32.el7.i686.rpm
libtiff-devel-4.0.3-32.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
libtiff-debuginfo-4.0.3-32.el7.i686.rpm
libtiff-debuginfo-4.0.3-32.el7.x86_64.rpm
libtiff-static-4.0.3-32.el7.i686.rpm
libtiff-static-4.0.3-32.el7.x86_64.rpm
libtiff-tools-4.0.3-32.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for libtiff is now available for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
Bugs Fixed
1319503 - buffer overflow in gif2tiff
1319666 - CVE-2016-3186 libtiff: buffer overflow in gif2tiff
1556708 - CVE-2018-7456 libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes a denial of service
1559704 - CVE-2018-8905 libtiff: heap-based buffer overflow in tif_lzw.c:LZWDecodeCompat() allows for denial of service
1577311 - CVE-2018-10779 libtiff: heap-based buffer over-read in TIFFWriteScanline function in tif_write.c
1579058 - CVE-2018-10963 libtiff: reachable assertion in TIFFWriteDirectorySec function in tif_dirwrite.c
1595575 - CVE-2018-12900 libtiff: Heap-based buffer overflow in the cpSeparateBufToContigBuf function resulting in a denial of service or possibly code execution
1631069 - CVE-2018-17100 libtiff: Integer overflow in multiply_ms in tools/ppm2tiff.c
1631078 - CVE-2018-17101 libtiff: Two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c
1644229 - CVE-2018-18557 libtiff: Out-of-bounds write in tif_jbig.c
1644448 - CVE-2018-18661 libtiff: tiff2bw tool failed memory allocation leads to crash