Bug 189933

Summary: CVE-2006-2024 multiple libtiff issues (CVE-2006-2025, CVE-2006-2026)
Product: Red Hat Enterprise Linux 4 Reporter: Josh Bressers <bressers>
Component: libtiffAssignee: Matthias Clasen <mclasen>
Status: CLOSED ERRATA QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: 4.0   
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: source=vendorsec,reported=20060411,public=20060303,impact=important
Fixed In Version: RHSA-2006-0425 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2006-05-09 11:32:43 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
Patch extracted from upstream CVS
none
patch that applies to RHEL21 and RHEL3 none

Description Josh Bressers 2006-04-25 21:20:12 UTC
Created attachment 128227 [details]
Patch extracted from upstream CVS

Comment 1 Josh Bressers 2006-04-25 21:20:12 UTC
Several libtiff issues were reported upstream in this bug:
http://bugzilla.remotesensing.org/show_bug.cgi?id=1102

Here is the changelog information for these issues (mangled to groups issues
together).  The dates are as such:

2006-03-07  Andrey Kiselev  <dron.edu>
2006-03-03  Andrey Kiselev  <dron.edu>


Denial of service
-----------------
    * libtiff/tif_dirread.c: Fixed error reporting in TIFFFetchAnyArray()
    function

    * libtiff/{tif_lzw.c, tif_pixarlog.c, tif_zip.c}: Use
    TIFFPredictorCleanup() in codec cleanup methods.

    * libtiff/{tif_jpeg.c, tif_pixarlog.c, tif_fax3.c, tif_zip.c}:
    Properly restore setfield/getfield methods in cleanup functions.

    * libtiff/{tif_predict.c, tif_predict.h}: Added new function
    TIFFPredictorCleanup() to restore parent decode/encode/field methods.

Integer Overflow
----------------
    * libtiff/tif_dirread.c: Fixed integer overflow condition in
    TIFFFetchData() function.

    * libtiff/tif_dirread.c: More wise check for integer overflow
    condition

Double Free
-----------
    * libtiff/{tif_jpeg.c, tif_pixarlog.c, tif_fax3.c, tif_zip.c}:
    Properly restore setfield/getfield methods in cleanup functions.

    Only the tif_jpeg.c patch has been shown to cause a double free issue.
    This block is the same as the one in the DoS section, just copied here for
    the double free description.


These issues seem to affect RHEL2.1 and RHEL3

The quick testing I did consisted of running tiffinfo over the reproducers in
the upstream bug, only the attachment in comment #1 crashed on RHEL.  A source
analysis may be needed to verify all these issues.

Comment 3 Matthias Clasen 2006-04-26 14:44:35 UTC
Created attachment 128255 [details]
patch that applies to RHEL21 and RHEL3

Comment 7 Red Hat Bugzilla 2006-05-09 11:32:43 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2006-0425.html