MGASA-2019-0366 - Updated libtiff packages fix security vulnerability

Publication date: 06 Dec 2019
URL: https://advisories.mageia.org/MGASA-2019-0366.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2019-17546

The updated packages fix a security vulnerability:

tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1
and other products, has an integer overflow that potentially causes a
heap-based buffer overflow via a crafted RGBA image, related to a
"Negative-size-param" condition (CVE-2019-17546).

References:
- https://bugs.mageia.org/show_bug.cgi?id=25777
- https://www.debian.org/lts/security/2019/dla-2009
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17546

SRPMS:
- 7/core/libtiff-4.1.0-2.git20191120.1.mga7

Mageia 2019-0366: libtiff security update

The updated packages fix a security vulnerability: tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potenti...

Summary

The updated packages fix a security vulnerability:
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition (CVE-2019-17546).

References

- https://bugs.mageia.org/show_bug.cgi?id=25777

- https://www.debian.org/lts/security/2019/dla-2009

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17546

Resolution

MGASA-2019-0366 - Updated libtiff packages fix security vulnerability

SRPMS

- 7/core/libtiff-4.1.0-2.git20191120.1.mga7

Severity
Publication date: 06 Dec 2019
URL: https://advisories.mageia.org/MGASA-2019-0366.html
Type: security
CVE: CVE-2019-17546

Related News