USN-5523-1

Source
https://ubuntu.com/security/notices/USN-5523-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5523-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5523-1
Related
Published
2022-07-19T11:05:26.053356Z
Modified
2022-07-19T11:05:26.053356Z
Summary
tiff vulnerabilities
Details

It was discovered that LibTIFF was not properly performing checks to guarantee that allocated memory space existed, which could lead to a NULL pointer dereference via a specially crafted file. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-0907, CVE-2022-0908)

It was discovered that LibTIFF was not properly performing checks to avoid division calculations where the denominator value was zero, which could lead to an undefined behavior situation via a specially crafted file. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-0909)

It was discovered that LibTIFF was not properly performing bounds checks, which could lead to an out-of-bounds read via a specially crafted file. An attacker could possibly use this issue to cause a denial of service or to expose sensitive information. (CVE-2022-0924)

It was discovered that LibTIFF was not properly performing the calculation of data that would eventually be used as a reference for bounds checking operations, which could lead to an out-of-bounds read via a specially crafted file. An attacker could possibly use this issue to cause a denial of service or to expose sensitive information. (CVE-2020-19131)

It was discovered that LibTIFF was not properly terminating a function execution when processing incorrect data, which could lead to an out-of-bounds read via a specially crafted file. An attacker could possibly use this issue to cause a denial of service or to expose sensitive information. (CVE-2020-19144)

It was discovered that LibTIFF was not properly performing checks when setting the value for data later used as reference during memory access, which could lead to an out-of-bounds read via a specially crafted file. An attacker could possibly use this issue to cause a denial of service or to expose sensitive information. (CVE-2022-22844)

References

Affected packages

Ubuntu:Pro:14.04:LTS / tiff

Package

Name
tiff
Purl
pkg:deb/ubuntu/tiff?arch=src?distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.3-7ubuntu0.11+esm2

Affected versions

4.*

4.0.2-4ubuntu3
4.0.3-5ubuntu1
4.0.3-6
4.0.3-6ubuntu1
4.0.3-7
4.0.3-7ubuntu0.1
4.0.3-7ubuntu0.2
4.0.3-7ubuntu0.3
4.0.3-7ubuntu0.4
4.0.3-7ubuntu0.6
4.0.3-7ubuntu0.7
4.0.3-7ubuntu0.8
4.0.3-7ubuntu0.9
4.0.3-7ubuntu0.10
4.0.3-7ubuntu0.11
4.0.3-7ubuntu0.11+esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "4.0.3-7ubuntu0.11+esm2",
            "binary_name": "libtiff-doc"
        },
        {
            "binary_version": "4.0.3-7ubuntu0.11+esm2",
            "binary_name": "libtiff-opengl"
        },
        {
            "binary_version": "4.0.3-7ubuntu0.11+esm2",
            "binary_name": "libtiff-opengl-dbgsym"
        },
        {
            "binary_version": "4.0.3-7ubuntu0.11+esm2",
            "binary_name": "libtiff-tools"
        },
        {
            "binary_version": "4.0.3-7ubuntu0.11+esm2",
            "binary_name": "libtiff-tools-dbgsym"
        },
        {
            "binary_version": "4.0.3-7ubuntu0.11+esm2",
            "binary_name": "libtiff4-dev"
        },
        {
            "binary_version": "4.0.3-7ubuntu0.11+esm2",
            "binary_name": "libtiff5"
        },
        {
            "binary_version": "4.0.3-7ubuntu0.11+esm2",
            "binary_name": "libtiff5-alt-dev"
        },
        {
            "binary_version": "4.0.3-7ubuntu0.11+esm2",
            "binary_name": "libtiff5-dbgsym"
        },
        {
            "binary_version": "4.0.3-7ubuntu0.11+esm2",
            "binary_name": "libtiff5-dev"
        },
        {
            "binary_version": "4.0.3-7ubuntu0.11+esm2",
            "binary_name": "libtiffxx5"
        },
        {
            "binary_version": "4.0.3-7ubuntu0.11+esm2",
            "binary_name": "libtiffxx5-dbgsym"
        }
    ]
}

Ubuntu:Pro:16.04:LTS / tiff

Package

Name
tiff
Purl
pkg:deb/ubuntu/tiff?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.6-1ubuntu0.8+esm2

Affected versions

4.*

4.0.3-12.3ubuntu2
4.0.5-1
4.0.6-1
4.0.6-1ubuntu0.1
4.0.6-1ubuntu0.2
4.0.6-1ubuntu0.3
4.0.6-1ubuntu0.4
4.0.6-1ubuntu0.5
4.0.6-1ubuntu0.6
4.0.6-1ubuntu0.7
4.0.6-1ubuntu0.8
4.0.6-1ubuntu0.8+esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "4.0.6-1ubuntu0.8+esm2",
            "binary_name": "libtiff-doc"
        },
        {
            "binary_version": "4.0.6-1ubuntu0.8+esm2",
            "binary_name": "libtiff-opengl"
        },
        {
            "binary_version": "4.0.6-1ubuntu0.8+esm2",
            "binary_name": "libtiff-opengl-dbgsym"
        },
        {
            "binary_version": "4.0.6-1ubuntu0.8+esm2",
            "binary_name": "libtiff-tools"
        },
        {
            "binary_version": "4.0.6-1ubuntu0.8+esm2",
            "binary_name": "libtiff-tools-dbgsym"
        },
        {
            "binary_version": "4.0.6-1ubuntu0.8+esm2",
            "binary_name": "libtiff5"
        },
        {
            "binary_version": "4.0.6-1ubuntu0.8+esm2",
            "binary_name": "libtiff5-dbgsym"
        },
        {
            "binary_version": "4.0.6-1ubuntu0.8+esm2",
            "binary_name": "libtiff5-dev"
        },
        {
            "binary_version": "4.0.6-1ubuntu0.8+esm2",
            "binary_name": "libtiffxx5"
        },
        {
            "binary_version": "4.0.6-1ubuntu0.8+esm2",
            "binary_name": "libtiffxx5-dbgsym"
        }
    ]
}