CVE-2010-2596

Publication date 2 July 2010

Last updated 24 July 2024


Ubuntu priority

The OJPEGPostDecode function in tif_ojpeg.c in LibTIFF 3.9.0 and 3.9.2, as used in tiff2ps, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted TIFF image, related to "downsampled OJPEG input."

Read the notes from the security team

Status

Package Ubuntu Release Status
tiff 17.10 artful
Not affected
17.04 zesty
Not affected
16.10 yakkety
Not affected
16.04 LTS xenial
Not affected
15.10 wily
Not affected
15.04 vivid
Not affected
14.10 utopic
Not affected
14.04 LTS trusty
Not affected
13.10 saucy
Not affected
13.04 raring Ignored end of life
12.10 quantal
Not affected
12.04 LTS precise Ignored end of life
11.10 oneiric Ignored end of life
11.04 natty Ignored end of life
10.10 maverick Ignored end of life
10.04 LTS lucid Ignored end of life
9.10 karmic Ignored end of life
9.04 jaunty Ignored end of life
8.04 LTS hardy
Not affected
6.06 LTS dapper Ignored end of life

Notes


mdeslaur

RedHat claims this is fixed by RHSA-2014-0222, no specific patch though, so one of the patches for other CVEs must have fixed it at the same time. cannot reproduce on quantal+ also check for missing parts of CVE-2014-8127 and CVE-2014-8128 this will not be fixed in precise/esm