Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1631069 - (CVE-2018-17100) CVE-2018-17100 libtiff: Integer overflow in multiply_ms in tools/ppm2tiff.c
CVE-2018-17100 libtiff: Integer overflow in multiply_ms in tools/ppm2tiff.c
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20180916,reported=2...
: Security
Depends On: 1631071 1631072 1631073 1631074 1632578 1631070
Blocks: 1631081
  Show dependency treegraph
 
Reported: 2018-09-19 16:22 EDT by Pedro Sampaio
Modified: 2018-10-02 06:26 EDT (History)
18 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Pedro Sampaio 2018-09-19 16:22:02 EDT
An issue was discovered in LibTIFF 4.0.9. There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file.

Upstream issue:

http://bugzilla.maptools.org/show_bug.cgi?id=2810

Upstream patch:

https://gitlab.com/libtiff/libtiff/merge_requests/33/diffs?commit_id=6da1fb3f64d43be37e640efbec60400d1f1ac39e
Comment 1 Pedro Sampaio 2018-09-19 16:23:28 EDT
Created libtiff tracking bugs for this issue:

Affects: fedora-all [bug 1631070]


Created mingw-libtiff tracking bugs for this issue:

Affects: epel-7 [bug 1631072]
Affects: fedora-all [bug 1631071]
Comment 3 Huzaifa S. Sidhpurwala 2018-09-25 03:20:14 EDT
Analysis:

Classic heap buffer overflow caused by integer overflow in ppm2tiff. The tool is used to concert ppm format files to TIFF.

Note You need to log in before you can comment on or make changes to this bug.