Bugzilla – Bug 1213274
VUL-0: CVE-2023-3618: tiff: NULL pointer dereference in Fax3Encode() in libtiff/tif_fax3.c
Last modified: 2024-07-10 13:33:54 UTC
CVE-2023-3618 A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3618 https://bugzilla.redhat.com/show_bug.cgi?id=2215865 https://www.cve.org/CVERecord?id=CVE-2023-3618 https://access.redhat.com/security/cve/CVE-2023-3618
To be fixed yet: https://gitlab.com/libtiff/libtiff/-/issues/529 The description in #0 is wrong by the way, this is a NULL pointer dereference, not a buffer overflow: AddressSanitizer:DEADLYSIGNAL ================================================================= ==1539810==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000010 (pc 0x7f9578167e9a bp 0x60e000000124 sp 0x7ffe11d99168 T0) ==1539810==The signal is caused by a WRITE memory access. ==1539810==Hint: address points to the zero page. #0 0x7f9578167e9a (/lib/x86_64-linux-gnu/libc.so.6+0xbee9a) #1 0x5d5bcd in _TIFFmemcpy /home/afl-libtiff/libtiff/tif_unix.c:345:5 #2 0x5f18f2 in Fax3Encode /home/afl-libtiff/libtiff/tif_fax3.c:1164:17 ... Which corresponds to this piece of code in tif_fax3.c (sp is NULL): 1163 else 1164 _TIFFmemcpy(sp->refline, bp, sp->b.rowbytes);
Patch tiff-CVE-2023-3618.patch in home:mvetter:branches:OBS_Maintained:tiff. Will fix a couple of more and then submit.
SR accepted. Factory and ALP have tiff 4.6.0 by now.
SUSE-SU-2023:4371-1: An update that solves nine vulnerabilities can now be installed. Category: security (moderate) Bug References: 1212535, 1212881, 1212883, 1212888, 1213273, 1213274, 1213589, 1213590, 1214574 CVE References: CVE-2020-18768, CVE-2023-25433, CVE-2023-26966, CVE-2023-2908, CVE-2023-3316, CVE-2023-3576, CVE-2023-3618, CVE-2023-38288, CVE-2023-38289 Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): tiff-4.0.9-44.71.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): tiff-4.0.9-44.71.1 SUSE Linux Enterprise Server 12 SP5 (src): tiff-4.0.9-44.71.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): tiff-4.0.9-44.71.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4370-1: An update that solves nine vulnerabilities can now be installed. Category: security (moderate) Bug References: 1212535, 1212881, 1212883, 1212888, 1213273, 1213274, 1213589, 1213590, 1214574 CVE References: CVE-2020-18768, CVE-2023-25433, CVE-2023-26966, CVE-2023-2908, CVE-2023-3316, CVE-2023-3576, CVE-2023-3618, CVE-2023-38288, CVE-2023-38289 Sources used: SUSE Linux Enterprise Micro 5.2 (src): tiff-4.0.9-150000.45.32.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): tiff-4.0.9-150000.45.32.1 openSUSE Leap Micro 5.3 (src): tiff-4.0.9-150000.45.32.1 openSUSE Leap Micro 5.4 (src): tiff-4.0.9-150000.45.32.1 openSUSE Leap 15.4 (src): tiff-4.0.9-150000.45.32.1 openSUSE Leap 15.5 (src): tiff-4.0.9-150000.45.32.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): tiff-4.0.9-150000.45.32.1 SUSE Linux Enterprise Micro 5.3 (src): tiff-4.0.9-150000.45.32.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): tiff-4.0.9-150000.45.32.1 SUSE Linux Enterprise Micro 5.4 (src): tiff-4.0.9-150000.45.32.1 SUSE Linux Enterprise Micro 5.5 (src): tiff-4.0.9-150000.45.32.1 Basesystem Module 15-SP4 (src): tiff-4.0.9-150000.45.32.1 Basesystem Module 15-SP5 (src): tiff-4.0.9-150000.45.32.1 SUSE Package Hub 15 15-SP4 (src): tiff-4.0.9-150000.45.32.1 SUSE Package Hub 15 15-SP5 (src): tiff-4.0.9-150000.45.32.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
All done, closing.