Bug 189933 - CVE-2006-2024 multiple libtiff issues (CVE-2006-2025, CVE-2006-2026)
Summary: CVE-2006-2024 multiple libtiff issues (CVE-2006-2025, CVE-2006-2026)
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 4
Classification: Red Hat
Component: libtiff
Version: 4.0
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
: ---
Assignee: Matthias Clasen
QA Contact:
URL:
Whiteboard: source=vendorsec,reported=20060411,pu...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2006-04-25 21:20 UTC by Josh Bressers
Modified: 2007-11-30 22:07 UTC (History)
0 users

Fixed In Version: RHSA-2006-0425
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2006-05-09 11:32:43 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
Patch extracted from upstream CVS (14.72 KB, patch)
2006-04-25 21:20 UTC, Josh Bressers
no flags Details | Diff
patch that applies to RHEL21 and RHEL3 (6.49 KB, patch)
2006-04-26 14:44 UTC, Matthias Clasen
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2006:0425 0 normal SHIPPED_LIVE Important: libtiff security update 2006-05-09 04:00:00 UTC

Description Josh Bressers 2006-04-25 21:20:12 UTC
Created attachment 128227 [details]
Patch extracted from upstream CVS

Comment 1 Josh Bressers 2006-04-25 21:20:12 UTC
Several libtiff issues were reported upstream in this bug:
http://bugzilla.remotesensing.org/show_bug.cgi?id=1102

Here is the changelog information for these issues (mangled to groups issues
together).  The dates are as such:

2006-03-07  Andrey Kiselev  <dron.edu>
2006-03-03  Andrey Kiselev  <dron.edu>


Denial of service
-----------------
    * libtiff/tif_dirread.c: Fixed error reporting in TIFFFetchAnyArray()
    function

    * libtiff/{tif_lzw.c, tif_pixarlog.c, tif_zip.c}: Use
    TIFFPredictorCleanup() in codec cleanup methods.

    * libtiff/{tif_jpeg.c, tif_pixarlog.c, tif_fax3.c, tif_zip.c}:
    Properly restore setfield/getfield methods in cleanup functions.

    * libtiff/{tif_predict.c, tif_predict.h}: Added new function
    TIFFPredictorCleanup() to restore parent decode/encode/field methods.

Integer Overflow
----------------
    * libtiff/tif_dirread.c: Fixed integer overflow condition in
    TIFFFetchData() function.

    * libtiff/tif_dirread.c: More wise check for integer overflow
    condition

Double Free
-----------
    * libtiff/{tif_jpeg.c, tif_pixarlog.c, tif_fax3.c, tif_zip.c}:
    Properly restore setfield/getfield methods in cleanup functions.

    Only the tif_jpeg.c patch has been shown to cause a double free issue.
    This block is the same as the one in the DoS section, just copied here for
    the double free description.


These issues seem to affect RHEL2.1 and RHEL3

The quick testing I did consisted of running tiffinfo over the reproducers in
the upstream bug, only the attachment in comment #1 crashed on RHEL.  A source
analysis may be needed to verify all these issues.

Comment 3 Matthias Clasen 2006-04-26 14:44:35 UTC
Created attachment 128255 [details]
patch that applies to RHEL21 and RHEL3

Comment 7 Red Hat Bugzilla 2006-05-09 11:32:43 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2006-0425.html



Note You need to log in before you can comment on or make changes to this bug.