Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 585508 (CVE-2016-5318, CVE-2016-5319)

Summary: <media-libs/tiff-4.0.7: two vulnerabilities (CVE-2016-{5318,5319})
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: graphics+disabled
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: B2 [glsa cve]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2016-06-10 08:54:51 UTC
From https://bugzilla.redhat.com/show_bug.cgi?id=1344068:

A stack-based buffer overflow vulnerability was reported in thumbnail's _TIFFVGetField() function. 
Memory corruption can be triggered when handling maliciously crafted tiff file causing application 
to crash.

CVE assignment:

http://seclists.org/oss-sec/2016/q2/486



From https://bugzilla.redhat.com/show_bug.cgi?id=1344069:

Heap-based buffer overflow vulnerability was found in tif_packbits.c in PackBitsEncode function. Memory corruption can be triggered when bmp2tiff is handling maliciously crafted bmp file causing application to crash.

CVE assignment:

http://seclists.org/oss-sec/2016/q2/486


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2017-01-09 16:15:33 UTC
Vulnerabilities were found in bmp2tiff and thumbnail utility. Upstream decided to remove both tools with v4.0.7.

Added to existing GLSA request.
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2017-01-09 17:01:26 UTC
This issue was resolved and addressed in
 GLSA 201701-16 at https://security.gentoo.org/glsa/201701-16
by GLSA coordinator Thomas Deutschmann (whissi).