Bug 20057 - libtiff new security issues CVE-2016-1009[2-5], CVE-2017-5225, CVE-2017-5849 and more
Summary: libtiff new security issues CVE-2016-1009[2-5], CVE-2017-5225, CVE-2017-5849 ...
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: https://lwn.net/Vulnerabilities/711777/
Whiteboard: MGA5-64-OK MGA5-32-OK advisory
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2017-01-01 20:58 CET by David Walser
Modified: 2017-07-07 12:06 CEST (History)
9 users (show)

See Also:
Source RPM: libtiff-4.0.7-1.mga5.src.rpm
CVE:
Status comment:


Attachments
List of reproducer files indexed on CVE (1.80 KB, text/plain)
2017-06-18 12:12 CEST, Len Lawrence
Details
Collection of crafted files to be used for proof of concept (3.73 KB, application/octet-stream)
2017-06-18 12:18 CEST, Len Lawrence
Details
Digest of poc tests run before update (3.69 KB, application/octet-stream)
2017-06-18 12:50 CEST, Len Lawrence
Details
List of poc test commands (2.18 KB, text/plain)
2017-06-18 13:54 CEST, Len Lawrence
Details
Summary of poc tests after the update (3.23 KB, application/octet-stream)
2017-06-18 23:51 CEST, Len Lawrence
Details
Functionality tests using libtiff utilities (5.66 KB, text/plain)
2017-06-19 16:51 CEST, Len Lawrence
Details

Description David Walser 2017-01-01 20:58:17 CET
CVEs have been assigned for security issues in libtiff:
http://openwall.com/lists/oss-security/2017/01/01/10
http://openwall.com/lists/oss-security/2017/01/01/11

There were several other CVE requests for libtiff today:
http://openwall.com/lists/oss-security/2017/01/01/

At least some of the issues have been fixed in upstream git.
David Walser 2017-01-01 20:59:17 CET

CC: (none) => nicolas.salguero
Whiteboard: (none) => MGA5TOO

Comment 1 Marja Van Waes 2017-01-02 00:36:29 CET
Assigning to the registered maintainer

Assignee: bugsquad => nicolas.salguero
CC: (none) => marja11

Comment 2 Nicolas Salguero 2017-01-10 11:28:02 CET
Hi David,

The latest CVS version of libtiff corrects CVE-2016-1009[2-4] as well as many other security issues that have not been assigned a CVE.  But CVE-2016-10095 and several other security issues that have not been assigned a CVE are not fixed yet (and I see no progress in solving those problems).

What is the best choice in your opinion: do I wait for a fix for at least CVE-2016-10095 or do I push a version (based upon the latest CVS version; in that case, I will create a separate bug report for CVE-2016-10095)?

Best regards,

Nico.
Comment 3 David Walser 2017-01-10 15:06:01 CET
I guess we can give it a little more time, as that's a lot of issues being reported at once and I imagine they're still working on fixing them.
Comment 4 David Walser 2017-01-15 00:13:54 CET
Debian has issued an advisory for this on January 13:
https://www.debian.org/security/2017/dsa-3762
David Walser 2017-01-16 18:51:52 CET

URL: (none) => https://lwn.net/Vulnerabilities/711777/

Comment 5 David Walser 2017-01-25 00:13:16 CET
CVE-2017-5225:
https://lwn.net/Vulnerabilities/712363/
Comment 6 Nicolas Salguero 2017-01-27 11:05:58 CET
I pushed to Cauldron a version that corrects at least CVE-2016-1009[2-4] and CVE-2017-5225.
Comment 7 David Walser 2017-02-02 11:47:41 CET
CVE-2017-5849:
http://openwall.com/lists/oss-security/2017/02/02/2

Summary: libtiff new security issues CVE-2016-1009[2-5] and more => libtiff new security issues CVE-2016-1009[2-5], CVE-2017-5225, CVE-2017-5849 and more

Comment 8 David Walser 2017-03-25 16:25:53 CET
CVE-2016-1026[6-9] and CVE-2016-1027[0-2]:
http://openwall.com/lists/oss-security/2017/03/25/2
http://openwall.com/lists/oss-security/2017/03/25/3
Comment 9 David Walser 2017-04-09 17:42:39 CEST
(In reply to David Walser from comment #8)
> CVE-2016-1026[6-9] and CVE-2016-1027[0-2]:
> http://openwall.com/lists/oss-security/2017/03/25/2
> http://openwall.com/lists/oss-security/2017/03/25/3

Fedora has issued an advisory for this today (April 9):
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/CFEQDPO55JLW4OTNZMTCX6DPJFVJTWAK/
Comment 11 David Walser 2017-04-11 00:48:22 CEST
(In reply to David Walser from comment #8)
> CVE-2016-1026[6-9] and CVE-2016-1027[0-2]:
> http://openwall.com/lists/oss-security/2017/03/25/2
> http://openwall.com/lists/oss-security/2017/03/25/3

Fedora has issued an advisory for this today (April 10):
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/KLH7V5OQSTAJWJSTJANTEQ4WZWONWL4W/
Comment 13 Nicolas Lécureuil 2017-04-28 08:50:09 CEST
cauldron has a newer snapshot, including already all this CVE Fixes

Whiteboard: MGA5TOO => (none)
CC: (none) => mageia
Version: Cauldron => 5

Comment 14 David Walser 2017-05-06 01:12:35 CEST
Debian has issued an advisory for this on May 3:
https://www.debian.org/security/2017/dsa-3844

It includes CVE-2016-3658 and CVE-2016-9535, which I don't believe I've previously mentioned.
Comment 15 Zombie Ryushu 2017-05-06 09:13:01 CEST
Package        : tiff
CVE ID         : CVE-2016-3658  CVE-2016-9535  CVE-2016-10266
                 CVE-2016-10267 CVE-2016-10269 CVE-2016-10270
		 CVE-2017-5225  CVE-2017-7592  CVE-2017-7593
		 CVE-2017-7594  CVE-2017-7595  CVE-2017-7596
		 CVE-2017-7597  CVE-2017-7598  CVE-2017-7599
		 CVE-2017-7600  CVE-2017-7601  CVE-2017-7602

Multiple vulnerabilities have been discovered in the libtiff library and
the included tools, which may result in denial of service, memory
disclosure or the execution of arbitrary code.

CC: (none) => zombie_ryushu

Comment 16 David Walser 2017-06-02 03:33:18 CEST
Upstream today (June 1) committed a fix for an unfixed remaining portion of CVE-2014-8128:
http://bugzilla.maptools.org/show_bug.cgi?id=2580#c7
Comment 17 David Walser 2017-06-02 03:33:43 CEST
(In reply to David Walser from comment #16)
> Upstream today (June 1) committed a fix for an unfixed remaining portion of
> CVE-2014-8128:
> http://bugzilla.maptools.org/show_bug.cgi?id=2580#c7

Original bug for that was here:
http://bugzilla.maptools.org/show_bug.cgi?id=2499
Comment 18 Nicolas Salguero 2017-06-02 10:04:54 CEST
libtiff-4.0.8-2.mga6 contains the fix.
Comment 19 Nicolas Salguero 2017-06-16 15:11:11 CEST
I did not see that the fix from June 1 also fixed CVE-2016-10095 so all the CVEs listed in this bug report are now fixed.
Comment 20 Nicolas Salguero 2017-06-16 15:31:08 CEST
Suggested advisory:
========================

The updated packages fix several security vulnerabilities:

Heap-based buffer overflow in the readContigStripsIntoBuffer function in tif_unix.c in LibTIFF 4.0.7 allows remote attackers to have unspecified impact via a crafted image. (CVE-2016-10092)

Integer overflow in tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to have unspecified impact via a crafted image, which triggers a heap-based buffer overflow.  (CVE-2016-10093)

Off-by-one error in the t2p_readwrite_pdf_image_tile function in tools/tiff2pdf.c in LibTIFF 4.0.7 allows remote attackers to have unspecified impact via a crafted image. (CVE-2016-10094)

Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (crash) via a crafted TIFF file. (CVE-2016-10095)

LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample value. (CVE-2017-5225)

LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_read.c:351:22. (CVE-2016-10266)

LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8. (CVE-2016-10267)

tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 78490" and libtiff/tif_unix.c:115:23. (CVE-2016-10268)

LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 512" and libtiff/tif_unix.c:340:2. (CVE-2016-10269)

LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 8" and libtiff/tif_read.c:523:22. (CVE-2016-10270)

tools/tiffcrop.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read and buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 1" and libtiff/tif_fax3.c:413:13. (CVE-2016-10271)

LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "WRITE of size 2048" and libtiff/tif_next.c:64:9. (CVE-2016-10272)

The putagreytile function in tif_getimage.c in LibTIFF 4.0.7 has a left-shift undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (CVE-2017-7592)

tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image. (CVE-2017-7593)

The OJPEGReadHeaderInfoSecTablesDcTable function in tif_ojpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (memory leak) via a crafted image. (CVE-2017-7594)

The JPEGSetupEncode function in tiff_jpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image. (CVE-2017-7595)

LibTIFF 4.0.7 has an "outside the range of representable values of type float" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (CVE-2017-7596)

tif_dirread.c in LibTIFF 4.0.7 has an "outside the range of representable values of type float" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (CVE-2017-7597)

tif_dirread.c in LibTIFF 4.0.7 might allow remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image. (CVE-2017-7598)

LibTIFF 4.0.7 has an "outside the range of representable values of type short" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (CVE-2017-7599)

LibTIFF 4.0.7 has an "outside the range of representable values of type unsigned char" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (CVE-2017-7600)

LibTIFF 4.0.7 has a "shift exponent too large for 64-bit type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (CVE-2017-7601)

LibTIFF 4.0.7 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (CVE-2017-7602)

The TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving the ma variable. (CVE-2016-3658)

tif_predict.h and tif_predict.c in libtiff 4.0.6 have assertions that can lead to assertion failures in debug mode, or buffer overflows in release mode, when dealing with unusual tile size like YCbCr with subsampling. Reported as MSVR 35105, aka "Predictor heap-buffer-overflow." (CVE-2016-9535)

libtiff: out-of-bounds write in multiple tools. (CVE-2014-8128)

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8128
========================

Updated packages in core/updates_testing:
========================
i586:
libtiff-progs-4.0.8-1.mga5.i586.rpm
libtiff5-4.0.8-1.mga5.i586.rpm
libtiff-devel-4.0.8-1.mga5.i586.rpm
libtiff-static-devel-4.0.8-1.mga5.i586.rpm

x86_64:
libtiff-progs-4.0.8-1.mga5.x86_64.rpm
lib64tiff5-4.0.8-1.mga5.x86_64.rpm
lib64tiff-devel-4.0.8-1.mga5.x86_64.rpm
lib64tiff-static-devel-4.0.8-1.mga5.x86_64.rpm

Source RPMs:
libtiff-4.0.8-1.mga5.src.rpm

Assignee: nicolas.salguero => qa-bugs
Status: NEW => ASSIGNED

Comment 21 Len Lawrence 2017-06-17 00:15:38 CEST
x86_64
Working on these - likely to take the rest of the weekend.  There are several PoC files to test the libtiff tools; with ASAN diagnostics wouldn't you know.

CC: (none) => tarazed25

Comment 22 Len Lawrence 2017-06-17 21:02:56 CEST
Still accumulating test data....
Dave Hodgins 2017-06-18 07:45:52 CEST

CC: (none) => davidwhodgins
Whiteboard: (none) => advisory

Comment 23 Len Lawrence 2017-06-18 12:12:24 CEST
Created attachment 9422 [details]
List of reproducer files indexed on CVE

No reproducers found for several of these.  For some, several issues are addressed on the one CVE.
Comment 24 Len Lawrence 2017-06-18 12:18:59 CEST
Created attachment 9423 [details]
Collection of crafted files to be used for proof of concept

There are no attributions for any of these, yet, but the original names of the files have been kept wherever possible to allow backtracking via browser searches.
Comment 25 Len Lawrence 2017-06-18 12:50:07 CEST
Created attachment 9424 [details]
Digest of poc tests run before update
Comment 26 Len Lawrence 2017-06-18 13:54:26 CEST
Created attachment 9425 [details]
List of poc test commands
Comment 27 Len Lawrence 2017-06-18 23:51:09 CEST
Created attachment 9427 [details]
Summary of poc tests after the update
Comment 28 Len Lawrence 2017-06-18 23:52:49 CEST
A number of PoC files have been collected from the CVE backlinks and tested both before and after updating libtiff.  The results are attached, too long and tedious to be posted in the clear.

Some of the CVEs do not have any obvious way to be tested.

The weak point in these tests is the interpretation of the output because the results are rarely clear-cut except where the earlier tests produce an abort, segfault or exception, but I have assigned pass or inconclusive as seems fitting.

If the functionality tests run fine then maybe the whole lot should be given the OK in spite of the lack of complete evidence that the patches work.  It is what we would do if there were no PoCs at all.
Comment 29 Len Lawrence 2017-06-19 16:49:58 CEST
Functionality tests were conducted using the available libtiff tools in /usr/bin.
Test results attached.

Roster of libtiff utilities:
/bin/fax2tiff
/bin/pamtotiff
/bin/pnmtotiff
/bin/pnmtotiffcmyk
/bin/ppm2tiff
/bin/PTtiff2psd
/bin/PTtiffdump
/bin/raw2tiff
/bin/tiff2bw
/bin/tiff2pdf
/bin/tiff2ps
/bin/tiff2rgba
/bin/tiffcmp
/bin/tiffcp
/bin/tiffcrop
/bin/tiffdither
/bin/tiffdump
/bin/tiffgt
/bin/tiffinfo
/bin/tiffmedian
/bin/tiffset
/bin/tiffsplit
/bin/tifftopnm

Some sample TIFF images:
http://web.stanford.edu/class/ee398a/samples.htm

These were all quick tests to show that the basic functions work; it was possible to run all of the tools except raw2tiff and fax2tiff.

Giving this an OK notwithstanding the uncertainties about the CVEs.
Len Lawrence 2017-06-19 16:50:13 CEST

Whiteboard: advisory => advisory MGA5-64-OK

Comment 30 Len Lawrence 2017-06-19 16:51:33 CEST
Created attachment 9429 [details]
Functionality tests using libtiff utilities
Comment 31 Herman Viaene 2017-06-30 14:22:19 CEST
MGA5-32 on Asus A6000VM Xfce
No installation issues.
Repeating Len's post-update test as in his attachment above with the poc tiff files, I'll give feedback below when my results deviate.
$ tiffcp -i 00082-libtiff-heap-overflow-cpStripToTile /tmp/foo
TIFFReadDirectoryCheckOrder: Warning, Invalid TIFF directory; tags are not sorted in ascending order.
TIFFReadDirectory: Warning, Unknown field with tag 8450 (0x2102) encountered.
TIFFReadDirectory: Warning, Unknown field with tag 1301 (0x515) encountered.
TIFFReadDirectory: Warning, Unknown field with tag 30069 (0x7575) encountered.
TIFFReadDirectory: Warning, Unknown field with tag 16384 (0x4000) encountered.
00082-libtiff-heap-overflow-cpStripToTile: Warning, Nonstandard tile width 6, convert file.
TIFFReadDirectory: Warning, Unknown field with tag 62708 (0xf4f4) encountered.
TIFFReadDirectory: Warning, Unknown field with tag 1 (0x1) encountered.
and more
TIFFFetchNormalTag: Warning, Incompatible type for "PhotometricInterpretation"; tag ignored.
TIFFFetchNormalTag: Warning, ASCII value for tag "DocumentName" contains null byte in value; value incorrectly truncated during reading due to implementation limitations.
TIFFFetchNormalTag: Warning, Incompatible type for "Make"; tag ignored.
TIFFFetchNormalTag: Warning, IO error during reading of "Tag 789"; tag ignored.
TIFFFetchNormalTag: Warning, Incorrect count for "FillOrder"; tag ignored.
TIFFFetchNormalTag: Warning, IO error during reading of "Tag 778"; tag ignored.
TIFFFetchNormalTag: Warning, Sanity check on size of "Tag 1051" value failed; tag ignored.
TIFFFetchNormalTag: Warning, IO error during reading of "Tag 2565"; tag ignored.
TIFFFetchNormalTag: Warning, IO error during reading of "Tag 16388"; tag ignored.
TIFFFetchNormalTag: Warning, Sanity check on size of "Tag 5" value failed; tag ignored.
TIFFReadDirectory: Warning, Photometric tag is missing, assuming data is YCbCr.
TIFFReadDirectory: Warning, BitsPerSample tag is missing, assuming 8 bits per sample.
TIFFScanlineSize: Integer arithmetic overflow.
TIFFReadDirectory: Cannot handle zero scanline size.
resulting in
]$ ls -als /tmp/foo
4 -rw-r--r-- 1 tester5 tester5 8 jun 30 14:12 /tmp/foo
which cannot be opened with ristretto.

CC: (none) => herman.viaene

Comment 32 Herman Viaene 2017-06-30 14:43:06 CEST
$ tiff2pdf 00112-libtiff-heapoverflow-_TIFFmemcpy -o /tmp/foo
diffrence is that pdf file has a wide but very sort red rectangle on top of the page.

$ tiffsplit 00104-libtiff-stackoverflow-_TIFFVGetField
no feedback at CLI, but file xaaa.tiff created. Ristretto finds it contains 21 parts but none of these display.

$ tiffcp -p separate poc_2656.tiff output.tiff
TIFFOpen: poc_2656.tiff: No such file or directory.
???????

$ tiffcrop 00099-libtiff-fpe-readSeparateStripsIntoBuffer /tmp/foo
foo file cannot be read by ristretto
Comment 33 Herman Viaene 2017-06-30 15:08:58 CEST
$ tiffcp -i 00068-libtiff-heapoverflow-_tiffWriteProc /tmp/foo
resulting file cannot be read by ristretto

$ tiffcp -i 00123-libtiff-fpe-JPEGSetupEncode /tmp/out
resulting file cannot be read by ristretto

None of the test cases result in an abort.
Comment 34 Herman Viaene 2017-06-30 15:43:39 CEST
Did some functional tests, guided by attachment above, and found some differences compared to Len's results:
The "cmyk" commands resulted in image files that could not be opened by ristretto nor Eye of Mate: wrong initial byte. But neither Gimp nor LibreOffice Draw complained and opened OK.
The "tiffgt" command did result in a color image not greyscale.
Otherwise I see no problems.

Whiteboard: advisory MGA5-64-OK => MGA5-64-OK MGA5-32-OK advisory

Lewis Smith 2017-06-30 20:08:51 CEST

Keywords: (none) => validated_update
CC: (none) => lewyssmith, sysadmin-bugs

Comment 35 Mageia Robot 2017-07-01 09:11:04 CEST
An update for this issue has been pushed to the Mageia Updates repository.

http://advisories.mageia.org/MGASA-2017-0199.html

Status: ASSIGNED => RESOLVED
Resolution: (none) => FIXED

Comment 36 David Walser 2017-07-07 12:06:32 CEST
CVE-2017-9147, CVE-2017-9403, CVE-2017-9404 also fixed by this update.

Note You need to log in before you can comment on or make changes to this bug.