CVE-2018-5360

NameCVE-2018-5360
DescriptionLibTIFF before 4.0.6 mishandles the reading of TIFF files, as demonstrated by a heap-based buffer over-read in the ReadTIFFImage function in coders/tiff.c in GraphicsMagick 1.3.27.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesELA-100-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tiff (PTS)jessie, jessie (lts)4.0.3-12.3+deb8u17fixed
stretch (security)4.0.8-2+deb9u8fixed
stretch (lts), stretch4.0.8-2+deb9u12fixed
buster (security), buster, buster (lts)4.1.0+git191117-2~deb10u9fixed
bullseye (security), bullseye4.2.0-1+deb11u5fixed
bookworm (security), bookworm4.5.0-6+deb12u1fixed
sid, trixie4.5.1+git230720-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tiffsourcejessie(not affected)
tiffsource(unstable)4.0.6-3
tiff3sourcewheezy3.9.6-11+deb7u14ELA-100-1
tiff3source(unstable)undetermined

Notes

[jessie] - tiff <no-dsa> (Minor issue, duplicate of CVE-2014-8127)
[wheezy] - tiff3 <postponed> (Minor issue, revisit once fixed upstream)
Issue demostrated in tiff via a vector through graphicsmagick, cf.
https://sourceforge.net/p/graphicsmagick/bugs/540/
Same issue as http://bugzilla.maptools.org/show_bug.cgi?id=2500 (CVE-2014-8127)
fixed as per 2016-10-25 (first release to ship the patch seems to be 4.0.7)
https://gitlab.com/libtiff/libtiff/commit/739dcd28a061738b317c1e9f91029d9cbc157159
[jessie] - tiff <not-affected> (duplicate of CVE-2014-8127, which is already fixed)

Search for package or bug name: Reporting problems