[SECURITY] [DSA 1137-1] New tiff packages fix several vulnerabilities



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1137-1 security@xxxxxxxxxx
http://www.debian.org/security/ Martin Schulze
August 2nd, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package : tiff
Vulnerability : several
Problem type : local (remote)
Debian-specific: no
CVE IDs : CVE-2006-3459 CVE-2006-3460 CVE-2006-3461 CVE-2006-3462
CVE-2006-3463 CVE-2006-3464 CVE-2006-3465

Tavis Ormandy of the Google Security Team discovered several problems
in the TIFF library. The Common Vulnerabilities and Exposures project
identifies the following issues:

CVE-2006-3459

Several stack-buffer overflows have been discovered.

CVE-2006-3460

A heap overflow vulnerability in the JPEG decoder may overrun a
buffer with more data than expected.

CVE-2006-3461

A heap overflow vulnerability in the PixarLog decoder may allow an
attacker to execute arbitrary code.

CVE-2006-3462

A heap overflow vulnerability has been discovered in the NeXT RLE
decoder.

CVE-2006-3463

An loop was discovered where a 16bit unsigned short was used to
iterate over a 32bit unsigned value so that the loop would never
terminate and continue forever.

CVE-2006-3464

Multiple unchecked arithmetic operations were uncovered, including
a number of the range checking operations designed to ensure the
offsets specified in TIFF directories are legitimate.

CVE-2006-3465

A flaw was also uncovered in libtiffs custom tag support which may
result in abnormal behaviour, crashes, or potentially arbitrary
code execution.

For the stable distribution (sarge) these problems have been fixed in
version 3.7.2-7.

For the unstable distribution (sid) these problems have been fixed in
version 3.8.2-6.

We recommend that you upgrade your libtiff packages.


Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/t/tiff/tiff_3.7.2-7.dsc
Size/MD5 checksum: 736 ce0ffb8cdd1130153deaefa8b59abe81
http://security.debian.org/pool/updates/main/t/tiff/tiff_3.7.2-7.diff.gz
Size/MD5 checksum: 17174 ff485016221ededfc8ce649538322211
http://security.debian.org/pool/updates/main/t/tiff/tiff_3.7.2.orig.tar.gz
Size/MD5 checksum: 1252995 221679f6d5c15670b3c242cbfff79a00

Alpha architecture:

http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_alpha.deb
Size/MD5 checksum: 47112 a4f7feea087ba03a84f745ee79a7ff56
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_alpha.deb
Size/MD5 checksum: 243840 f7abb618f36082be959f6e3c9a99cf8f
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_alpha.deb
Size/MD5 checksum: 479064 c137c6857ed320928f182115fbd94b21
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_alpha.deb
Size/MD5 checksum: 311206 c202ef6404c23ea7dc999c03e586c07f
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_alpha.deb
Size/MD5 checksum: 41228 53c5979e8c2556e5a19607c19e862368

AMD64 architecture:

http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_amd64.deb
Size/MD5 checksum: 46036 bc6d0c7db57a1dcae4b8dd65b4640243
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_amd64.deb
Size/MD5 checksum: 218060 d09ef1de8b31f074d2f05c7522858cf1
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_amd64.deb
Size/MD5 checksum: 459964 8be097d74ac788d87a8358b8f9e68d79
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_amd64.deb
Size/MD5 checksum: 267872 cc0a4241cd53de29b561286fcd91cf2c
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_amd64.deb
Size/MD5 checksum: 40804 136bc49ad0c85dc6fa9f61242cf97c05

ARM architecture:

http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_arm.deb
Size/MD5 checksum: 45536 0253b94c6f94a33c9942568f9093fedd
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_arm.deb
Size/MD5 checksum: 208630 45e2ef6af43bfbddb4aee00b659d287a
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_arm.deb
Size/MD5 checksum: 454194 354e1b4560b4a407c4b4faf5d2555b20
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_arm.deb
Size/MD5 checksum: 266148 f535b441d81a7786815d954c843b9c81
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_arm.deb
Size/MD5 checksum: 40304 fcd0980c8fc2dedaa8a6380e0d4736bd

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_i386.deb
Size/MD5 checksum: 45400 e51d8f157a2ef94cbc4e893f756be29a
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_i386.deb
Size/MD5 checksum: 206412 69a3c66b2c9733653e6e7f667ab260b3
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_i386.deb
Size/MD5 checksum: 453078 267f8f361f0dc87f40c8bc37d4785f57
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_i386.deb
Size/MD5 checksum: 252412 5720af1515d6c9ce04f0e7abea045955
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_i386.deb
Size/MD5 checksum: 40850 18710ba8ae073bd5a6e7b3c299cbae23

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_ia64.deb
Size/MD5 checksum: 48512 c57280d747f62859c4477a0f1dcbcfef
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_ia64.deb
Size/MD5 checksum: 269156 277ad4a79cd2148991134c6ed8c029fe
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_ia64.deb
Size/MD5 checksum: 511782 4b64fd28c917e7e2e158c7244cfc892d
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_ia64.deb
Size/MD5 checksum: 331790 614a46318d671800caab21e26df9c1bf
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_ia64.deb
Size/MD5 checksum: 42450 af80a3234e174d9f15bbb4e68d2b558f

HP Precision architecture:

http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_hppa.deb
Size/MD5 checksum: 46846 e863b11db8f25a221776ea306eeb1539
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_hppa.deb
Size/MD5 checksum: 230316 9ccb777cf49096a2dabf144de609b83c
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_hppa.deb
Size/MD5 checksum: 473764 6938692095c40fba1f5feca1efd243a8
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_hppa.deb
Size/MD5 checksum: 282648 68ffb8ebaac2404aa1f9a709e83abfc6
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_hppa.deb
Size/MD5 checksum: 41476 4327a6e2887ab7d5bb69d0476186d69e

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_m68k.deb
Size/MD5 checksum: 45408 e33d428b54a5776181803c28475e2a30
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_m68k.deb
Size/MD5 checksum: 193578 d7f3db57205002a50354df9cc1e74767
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_m68k.deb
Size/MD5 checksum: 443280 2e982f2b17745777ff6e249f627b1b4c
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_m68k.deb
Size/MD5 checksum: 235056 c362aaa8589f44a3dc533143c37fd16b
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_m68k.deb
Size/MD5 checksum: 40450 279a59887fd7a90b9d92415a07fe87f1

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_mips.deb
Size/MD5 checksum: 46300 c26b165f7098aa083170b90c8002406e
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_mips.deb
Size/MD5 checksum: 252404 77b6d4382ee49bab1d3b94ea69d3bd88
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_mips.deb
Size/MD5 checksum: 459088 34e8d02f8bac8bc4b059bc36109dda66
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_mips.deb
Size/MD5 checksum: 281156 c2bf726c93de2c1ce1cb289d65fec892
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_mips.deb
Size/MD5 checksum: 41086 85b8389df1df050f12fd87488ab46c02

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_mipsel.deb
Size/MD5 checksum: 46256 8a1cc8fbd9e7679f2ec722f46a300fe1
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_mipsel.deb
Size/MD5 checksum: 252820 876a24a6b4b49d19eb2d425f7271528e
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_mipsel.deb
Size/MD5 checksum: 459392 f1d09bb13a31f8ec73922f50d538b073
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_mipsel.deb
Size/MD5 checksum: 280986 eff50ab58f511148d9d56ecbbc02c162
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_mipsel.deb
Size/MD5 checksum: 41066 7490a101b2de00f6f458359f64b05daa

PowerPC architecture:

http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_powerpc.deb
Size/MD5 checksum: 47462 3eaaac85e15b48dd1add1fb314de9b74
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_powerpc.deb
Size/MD5 checksum: 235624 2d13e7c1769aab6d8a051817009d10ca
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_powerpc.deb
Size/MD5 checksum: 461300 94dddf225b2130da2daca1ec54b2c0b0
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_powerpc.deb
Size/MD5 checksum: 272868 0517f72923504549f4acf0fab1e1924f
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_powerpc.deb
Size/MD5 checksum: 42658 9dd0f68f37713263bc9a729d7216b35f

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_s390.deb
Size/MD5 checksum: 46422 039bfe0dde0063b276a57c1414a6d9ca
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_s390.deb
Size/MD5 checksum: 214056 b87d71aa653f45726d3b4ecd60b226b3
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_s390.deb
Size/MD5 checksum: 466474 6b6e2dd8152760e65d2af459deac62fc
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_s390.deb
Size/MD5 checksum: 267648 fc8d5662348991874f47953f20102b38
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_s390.deb
Size/MD5 checksum: 41078 090b4edea314fadf183bb31fd891be34

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_sparc.deb
Size/MD5 checksum: 45706 955588f87bf3796b962c6f18ad5ecbb3
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_sparc.deb
Size/MD5 checksum: 205502 710eb39e993e988dcc1abc5cefd2f559
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_sparc.deb
Size/MD5 checksum: 455492 76e4acd2000175c52d60f6b6f53aaa25
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_sparc.deb
Size/MD5 checksum: 258764 c33aacda7a8162ff5ba7fd9399e347a6
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_sparc.deb
Size/MD5 checksum: 40806 cefaef4ab3ed03fdeeec97a40081721f


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFE0O68W5ql+IAeqTIRAu2CAKCen9woCeYUfmTgqnDcigV2qzkpewCfaiz6
UuRcpsNysRI+l/oPURUKGZ0=
=cFlc
-----END PGP SIGNATURE-----



Relevant Pages