~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
PublicDateAtUSN: 2017-01-12
Candidate: CVE-2017-5225
PublicDate: 2017-01-12
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225
 http://www.ubuntu.com/usn/usn-3212-1
 http://www.ubuntu.com/usn/usn-3212-4
Description:
 LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the
 tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample
 value.
Ubuntu-Description:
Notes:
Bugs:
 http://bugzilla.maptools.org/show_bug.cgi?id=2656
 http://bugzilla.maptools.org/show_bug.cgi?id=2657
 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851297
Priority: medium
Discovered-by:
Assigned-to:

Patches_tiff:
 upstream: https://github.com/vadz/libtiff/commit/5c080298d59efa53264d7248bbe3a04660db6ef7
upstream_tiff: released (4.0.7-5)
precise_tiff: ignored (reached end-of-life)
precise/esm_tiff: released (3.9.5-2ubuntu1.11)
trusty_tiff: released (4.0.3-7ubuntu0.6)
vivid/stable-phone-overlay_tiff: ignored (reached end-of-life)
vivid/ubuntu-core_tiff: DNE
xenial_tiff: released (4.0.6-1ubuntu0.1)
yakkety_tiff: released (4.0.6-2ubuntu0.1)
zesty_tiff: not-affected (4.0.7-5)
devel_tiff: not-affected (4.0.7-5)