DescriptionIn LibTIFF 4.0.7, a memory leak vulnerability was found in the function OJPEGReadHeaderInfoSecTablesQTable in tif_ojpeg.c, which allows attackers to cause a denial of service via a crafted file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-983-1, DLA-984-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tiff (PTS)jessie4.0.3-12.3+deb8u5fixed
jessie (security)4.0.3-12.3+deb8u6fixed
stretch (security), stretch4.0.8-2+deb9u2fixed
buster, sid4.0.9-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs

Fixed by:
Possibly sensible to add the other memory leaks fixes in OJPEGReadHeaderInfoSecTables
method from tif_ojpeg.c, i.e.:
Reproducing the issue itself is "covered" after fixing
To verify 2ea32f7372b65c24b2816f11c04bf59b5090d05b fixes the issue build src:tiff
with ASAN with 5ed9fea523316c2f5cec4d393e4d5d671c2dbc33 reverted. Before the
2ea32f7372b65c24b2816f11c04bf59b5090d05b commit the Direct leak of 73 byte
with backtrace following the methods in
is shown.

Search for package or bug name: Reporting problems