Mageia alert MGASA-2018-0409 (libtiff)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2018-0409: Updated libtiff packages fix security vulnerabilities | |
Date: | Sat, 20 Oct 2018 15:56:35 +0200 | |
Message-ID: | <20181020135635.A3D8BA0050@duvel.mageia.org> |
MGASA-2018-0409 - Updated libtiff packages fix security vulnerabilities Publication date: 20 Oct 2018 URL: https://advisories.mageia.org/MGASA-2018-0409.html Type: security Affected Mageia releases: 6 CVE: CVE-2016-5319, CVE-2017-17942, CVE-2018-10779 Description: Heap-based buffer overflow in tif_packbits.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted bmp file (CVE-2016-5319). In LibTIFF 4.0.9, there is a heap-based buffer over-read in the function PackBitsEncode in tif_packbits.c (CVE-2017-17942). TIFFWriteScanline in tif_write.c in LibTIFF 3.8.2 has a heap-based buffer over-read, as demonstrated by bmp2tiff (CVE-2018-10779). References: - https://bugs.mageia.org/show_bug.cgi?id=23142 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5319 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1... SRPMS: - 6/core/libtiff-4.0.9-1.6.mga6