Tiff Security Update for Debian 7 LTS
Posted on: 12/13/2017 09:49 AM

Updated tiff packages has been released for Debian GNU/Linux 7 LTS

Tiff Security Update for Debian 7 LTS


Package : tiff
Version : 4.0.2-6+deb7u17
CVE ID : CVE-2017-9935
Debian Bug : 866109


In LibTIFF 4.0.8, there is a heap-based buffer overflow in the t2p_write_pdf
function in tools/tiff2pdf.c. This heap overflow could lead to different
damages. For example, a crafted TIFF document can lead to an out-of-bounds read
in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in
t2p_readwrite_pdf_image, or a double free in t2p_free. Given these
possibilities, it probably could cause arbitrary code execution.

This overflow is linked to an underlying assumption that all pages in a tiff
document will have the same transfer function. There is nothing in the tiff
standard that says this needs to be the case.

For Debian 7 "Wheezy", these problems have been fixed in version
4.0.2-6+deb7u17.

We recommend that you upgrade your tiff packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/tiff_security_update_for_debian_7_lts.html)