|
|
Subscribe / Log in / New account

Mageia alert MGASA-2019-0101 (libtiff)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2019-0101: Updated libtiff packages fix security vulnerability
Date:  Fri, 22 Feb 2019 01:36:45 +0100
Message-ID:  <20190222003645.8DB8D9FB97@duvel.mageia.org>

MGASA-2019-0101 - Updated libtiff packages fix security vulnerability Publication date: 22 Feb 2019 URL: https://advisories.mageia.org/MGASA-2019-0101.html Type: security Affected Mageia releases: 6 CVE: CVE-2019-7663 Description: An Invalid Address dereference was discovered in TIFFWriteDirectoryTagTransferfunction in libtiff/tif_dirwrite.c in LibTIFF 4.0.10, affecting the cpSeparateBufToContigBuf function in tiffcp.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted tiff file. This is different from CVE-2018-12900. (CVE-2019-7663) The invertImage() function in tiffcrop.c:9206 allows remote attackers to cause a denial of service (heap buffer overflow) via invert color space. References: - https://bugs.mageia.org/show_bug.cgi?id=24393 - http://bugzilla.maptools.org/show_bug.cgi?id=2831 - https://lists.fedoraproject.org/archives/list/package-ann... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7663 SRPMS: - 6/core/libtiff-4.0.10-1.git20190219.1.mga6


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds