Package        : gdal
Version        : 1.10.1+dfsg-8+deb8u2
CVE ID         : CVE-2019-17546


tif_getimage.c in LibTIFF, as used in GDAL has an integer overflow
that potentially causes a heap-based buffer overflow via a crafted
RGBA image, related to a "Negative-size-param" condition.

For Debian 8 "Jessie", this problem has been fixed in version
1.10.1+dfsg-8+deb8u2.

We recommend that you upgrade your gdal packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Best,
Utkarsh

Debian LTS: DLA-2147-1: gdal security update

March 18, 2020
tif_getimage.c in LibTIFF, as used in GDAL has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param"...

Summary

For Debian 8 "Jessie", this problem has been fixed in version
1.10.1+dfsg-8+deb8u2.

We recommend that you upgrade your gdal packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Best,
Utkarsh


Severity
Package : gdal
Version : 1.10.1+dfsg-8+deb8u2
CVE ID : CVE-2019-17546

Related News