Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:B04D30AF5D1D32BEFF62F8EECE8547C5
HistorySep 29, 2022 - 12:00 a.m.

USN-5523-2: LibTIFF vulnerabilities | Cloud Foundry

2022-09-2900:00:00
Cloud Foundry
www.cloudfoundry.org
15
libtiff vulnerabilities
canonical ubuntu
18.04 lts
cloud foundry
cve-2022-0907
cve-2022-0908
cve-2022-0909
cve-2022-0924
cve-2022-22844
medium severity

0.003 Low

EPSS

Percentile

65.7%

Severity

Medium

Vendor

Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 18.04

Description

USN-5523-1 fixed several vulnerabilities in LibTIFF. This update provides the fixes for CVE-2022-0907, CVE-2022-0908, CVE-2022-0909, CVE-2022-0924 and CVE-2022-22844 for Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. Original advisory details: It was discovered that LibTIFF was not properly perf orming checks to guarantee that allocated memory space existed, which could lead to a NULL pointer dereference via a specially crafted file. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-0907, CVE-2022-0908) It was discovered that LibTIFF was not properly performing checks to avoid division calculations where the denominator value was zero, which could lead to an undefined behavior situation via a specially crafted file. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-0909) It was discovered that LibTIFF was not properly performing bounds checks, which could lead to an out-of-bounds read via a specially crafted file. An attacker could possibly use this issue to cause a denial of service or to expose sensitive information. (CVE-2022-0924) It was discovered that LibTIFF was not properly performing the calculation of data that would eventually be used as a reference for bounds checking operations, which could lead to an out-of-bounds read via a specially crafted file. An attacker could possibly use this issue to cause a denial of service or to expose sensitive information. (CVE-2020-19131) It was discovered that LibTIFF was not properly terminating a function execution when processing incorrect data, which could lead to an out-of-bounds read via a specially crafted file. An attacker could possibly use this issue to cause a denial of service or to expose sensitive information. (CVE-2020-19144) It was discovered that LibTIFF was not properly performing checks when setting the value for data later used as reference during memory access, which could lead to an out-of-bounds read via a specially crafted file. An attacker could possibly use this issue to cause a denial of service or to expose sensitive information. (CVE-2022-22844) Update Instructions: Run sudo ua fix USN-5523-2 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtiff-opengl – 4.0.9-5ubuntu0.6 libtiff-tools – 4.0.9-5ubuntu0.6 libtiff5-dev – 4.0.9-5ubuntu0.6 libtiff-dev – 4.0.9-5ubuntu0.6 libtiff5 – 4.0.9-5ubuntu0.6 libtiffxx5 – 4.0.9-5ubuntu0.6 libtiff-doc – 4.0.9-5ubuntu0.6 No subscription required

CVEs contained in this USN include: CVE-2022-0907, CVE-2022-0908, CVE-2022-0909, CVE-2022-0924, CVE-2022-22844.

Affected Cloud Foundry Products and Versions

Severity is medium unless otherwise noted.

  • cflinuxfs3
    • All versions prior to 0.322.0
  • CF Deployment
    • All versions prior to 21.11.0

Mitigation

Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:

  • cflinuxfs3
    • Upgrade all versions to 0.322.0 or greater
  • CF Deployment
    • Upgrade all versions to 21.11.0 or greater

References

History

2022-09-29: Initial vulnerability report published.

CPENameOperatorVersion
cflinuxfs3lt0.322.0
cf deploymentlt21.11.0