Ubuntu has issued an advisory on July 13: https://ubuntu.com/security/notices/USN-6229-1 The issues are fixed upstream in 4.5.1. Mageia 8 is also affected.
Status comment: (none) => Fixed upstream in 4.5.1Whiteboard: (none) => MGA8TOO
This pkg is maintained by ns80, so assigning to you. You have already applied several CVE fixes.
Assignee: bugsquad => nicolas.salguero
Whiteboard: MGA8TOO => MGA9TOO, MGA8TOOSummary: libtiff new security issues CVE-2023-3316, CVE-2023-25433, CVE-2023-2696[56] => libtiff new security issues CVE-2023-2908, CVE-2023-3316, CVE-2023-3618, CVE-2023-25433, CVE-2023-2696[56], CVE-2023-3828[89]
Summary: libtiff new security issues CVE-2023-2908, CVE-2023-3316, CVE-2023-3618, CVE-2023-25433, CVE-2023-2696[56], CVE-2023-3828[89] => libtiff new security issues CVE-2023-2908, CVE-2023-331[68], CVE-2023-25433, CVE-2023-2696[56]CC: (none) => nicolas.salguero
Suggested advisory: ======================== The updated packages fix security vulnerabilities: A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service. (CVE-2023-2908) A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones. (CVE-2023-3316) A vulnerability was found in SourceCodester Resort Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument page leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. (CVE-2023-3618) libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV. (CVE-2023-25433) loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image. (CVE-2023-26965) libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian. (CVE-2023-26966) References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2908 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3316 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26965 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26966 https://ubuntu.com/security/notices/USN-6229-1 ======================== Updated packages in 8/core/updates_testing: ======================== lib(64)tiff5-4.2.0-1.16.mga8 lib(64)tiff-devel-4.2.0-1.16.mga8 lib(64)tiff-static-devel-4.2.0-1.16.mga8 libtiff-progs-4.2.0-1.16.mga8 from SRPM: libtiff-4.2.0-1.16.mga8.src.rpm Updated packages in 9/core/updates_testing: ======================== lib(64)tiff6-4.5.1-1.mga9 lib(64)tiff-devel-4.5.1-1.mga9 lib(64)tiff-static-devel-4.5.1-1.mga9 libtiff-progs-4.5.1-1.mga9 from SRPM: libtiff-4.5.1-1.mga9.src.rpm
Status: NEW => ASSIGNEDVersion: Cauldron => 9Whiteboard: MGA9TOO, MGA8TOO => MGA8TOOStatus comment: Fixed upstream in 4.5.1 => (none)Assignee: nicolas.salguero => qa-bugs
CC: (none) => mageia
MGA8-64 Xfce on Acer Aspire 5253 No installation issues Following wiki $ tiff2pdf pasfotoherman.tif > pasfotoherman.pdf pdf displays OK with atril $ tiffinfo pasfotoriet.tif TIFF Directory at offset 0x582322 (5776162) Image Width: 2176 Image Length: 2646 Resolution: 1200, 1200 pixels/inch Bits/Sample: 8 Compression Scheme: PackBits Photometric Interpretation: min-is-black Orientation: row 0 top, col 0 lhs Samples/Pixel: 1 Rows/Strip: 3 Planar Configuration: single image plane Software: xsane DateTime: 2013:03:15 10:49:43 this looks OK $ gimp pasfototineke.tif picture opens OK in gimp
Whiteboard: MGA8TOO => MGA8TOO MGA8-64-OKCC: (none) => herman.viaene
MGA9-64 Plasma, i5-2500, Intel graphics. Installed libtiff-progs, then updated using QArepo. No installation issues. I decided to vary from Herman's example, and used "urpmq --whatrequires lib64tiff6" to see what else might require this library. It's a rather long list. Using a photo of a hot air balloon named "floating.jpg:" $ convert floating.jpg floating.tif converted the image to tiff. $ display floating.tif displayed it on my monitor. $ tiffinfo floating.tif === TIFF directory 0 === TIFF Directory at offset 0x6e6138 (7233848) Image Width: 2040 Image Length: 1182 Resolution: 72, 72 pixels/inch Position: 0, 0 Bits/Sample: 8 Compression Scheme: None Photometric Interpretation: RGB color FillOrder: msb-to-lsb Orientation: row 0 top, col 0 lhs Samples/Pixel: 3 Rows/Strip: 160 Planar Configuration: single image plane Page Number: 0-1 White Point: 0.3127-0.329 PrimaryChromaticities: 0.640000,0.330000,0.300000,0.600000,0.150000,0.060000 (plus a lot of EXIF data) And last, $ gimp floating.tif opened the tiff image in Gimp. Looks OK in MGA9. Validating. Advisory in comment 2.
CC: (none) => andrewsfarm, sysadmin-bugsKeywords: (none) => validated_updateWhiteboard: MGA8TOO MGA8-64-OK => MGA8TOO MGA8-64-OK MGA9-64-OK
Keywords: (none) => advisoryCC: (none) => davidwhodgins
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2023-0255.html
Status: ASSIGNED => RESOLVEDResolution: (none) => FIXED