|
|
Subscribe / Log in / New account

Mageia alert MGASA-2019-0366 (libtiff)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2019-0366: Updated libtiff packages fix security vulnerability
Date:  Fri, 6 Dec 2019 15:16:50 +0100
Message-ID:  <20191206141650.F2F1D9F736@duvel.mageia.org>

MGASA-2019-0366 - Updated libtiff packages fix security vulnerability Publication date: 06 Dec 2019 URL: https://advisories.mageia.org/MGASA-2019-0366.html Type: security Affected Mageia releases: 7 CVE: CVE-2019-17546 Description: The updated packages fix a security vulnerability: tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition (CVE-2019-17546). References: - https://bugs.mageia.org/show_bug.cgi?id=25777 - https://www.debian.org/lts/security/2019/dla-2009 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1... SRPMS: - 7/core/libtiff-4.1.0-2.git20191120.1.mga7


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds