{"id":27229,"date":"2022-07-19T19:38:06","date_gmt":"2022-07-19T15:38:06","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/167768\/USN-5523-1.txt"},"modified":"2022-07-20T08:47:08","modified_gmt":"2022-07-20T04:17:08","slug":"ubuntu-security-notice-usn-5523-1","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/ubuntu-security-notice-usn-5523-1\/","title":{"rendered":"Ubuntu Security Notice USN-5523-1"},"content":{"rendered":"<p dir=\"ltr\">==========================================================================<br \/>\nUbuntu Security Notice USN-5523-1<br \/>\nJuly 19, 2022<\/p>\n<p dir=\"ltr\">tiff vulnerabilities<br \/>\n==========================================================================<\/p>\n<p dir=\"ltr\">A security issue affects these releases of Ubuntu and its derivatives:<\/p>\n<p dir=\"ltr\">&#8211; Ubuntu 16.04 ESM<br \/>\n&#8211; Ubuntu 14.04 ESM<\/p>\n<p dir=\"ltr\">Summary:<\/p>\n<p dir=\"ltr\">Several security issues were fixed in LibTIFF.<\/p>\n<p dir=\"ltr\">Software Description:<br \/>\n&#8211; tiff: Tag Image File Format (TIFF) library<\/p>\n<p dir=\"ltr\">Details:<\/p>\n<p dir=\"ltr\">It was discovered that LibTIFF was not properly performing checks to<br \/>\nguarantee that allocated memory space existed, which could lead to a<br \/>\nNULL pointer dereference via a specially crafted file. An attacker<br \/>\ncould possibly use this issue to cause a denial of service.<br \/>\n(CVE-2022-0907, CVE-2022-0908)<\/p>\n<p dir=\"ltr\">It was discovered that LibTIFF was not properly performing checks to<br \/>\navoid division calculations where the denominator value was zero,<br \/>\nwhich could lead to an undefined behavior situation via a specially<br \/>\ncrafted file. An attacker could possibly use this issue to cause a<br \/>\ndenial of service. (CVE-2022-0909)<\/p>\n<p dir=\"ltr\">It was discovered that LibTIFF was not properly performing bounds<br \/>\nchecks, which could lead to an out-of-bounds read via a specially<br \/>\ncrafted file. An attacker could possibly use this issue to cause a<br \/>\ndenial of service or to expose sensitive information. (CVE-2022-0924)<\/p>\n<p dir=\"ltr\">It was discovered that LibTIFF was not properly performing the<br \/>\ncalculation of data that would eventually be used as a reference for<br \/>\nbounds checking operations, which could lead to an out-of-bounds<br \/>\nread via a specially crafted file. An attacker could possibly use<br \/>\nthis issue to cause a denial of service or to expose sensitive<br \/>\ninformation. (CVE-2020-19131)<\/p>\n<p dir=\"ltr\">It was discovered that LibTIFF was not properly terminating a<br \/>\nfunction execution when processing incorrect data, which could lead<br \/>\nto an out-of-bounds read via a specially crafted file. An attacker<br \/>\ncould possibly use this issue to cause a denial of service or to<br \/>\nexpose sensitive information. (CVE-2020-19144)<\/p>\n<p dir=\"ltr\">It was discovered that LibTIFF was not properly performing checks<br \/>\nwhen setting the value for data later used as reference during memory<br \/>\naccess, which could lead to an out-of-bounds read via a specially<br \/>\ncrafted file. An attacker could possibly use this issue to cause a<br \/>\ndenial of service or to expose sensitive information.<br \/>\n(CVE-2022-22844)<\/p>\n<p dir=\"ltr\">Update instructions:<\/p>\n<p dir=\"ltr\">The problem can be corrected by updating your system to the following<br \/>\npackage versions:<\/p>\n<p dir=\"ltr\">Ubuntu 16.04 ESM:<br \/>\nlibtiff-opengl 4.0.6-1ubuntu0.8+esm2<br \/>\nlibtiff-tools 4.0.6-1ubuntu0.8+esm2<br \/>\nlibtiff5 4.0.6-1ubuntu0.8+esm2<br \/>\nlibtiffxx5 4.0.6-1ubuntu0.8+esm2<\/p>\n<p dir=\"ltr\">Ubuntu 14.04 ESM:<br \/>\nlibtiff-opengl 4.0.3-7ubuntu0.11+esm2<br \/>\nlibtiff-tools 4.0.3-7ubuntu0.11+esm2<br \/>\nlibtiff5 4.0.3-7ubuntu0.11+esm2<br \/>\nlibtiffxx5 4.0.3-7ubuntu0.11+esm2<\/p>\n<p dir=\"ltr\">In general, a standard system update will make all the necessary changes.<\/p>\n<p dir=\"ltr\">References:<br \/>\nhttps:\/\/ubuntu.com\/security\/notices\/USN-5523-1<br \/>\nCVE-2020-19131, CVE-2020-19144, CVE-2022-0907, CVE-2022-0908,<br \/>\nCVE-2022-0909, CVE-2022-0924, CVE-2022-22844<\/p>\n","protected":false},"excerpt":{"rendered":"<p>========================================================================== Ubuntu Security Notice USN-5523-1 July 19, 2022 tiff vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: &#8211; Ubuntu 16.04 ESM &#8211; Ubuntu 14.04 ESM Summary: Several security issues were fixed in LibTIFF. Software Description: &#8211; tiff: Tag Image File Format (TIFF) library Details: It was discovered that LibTIFF was [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-27229","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/27229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=27229"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/27229\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=27229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=27229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=27229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}