MGASA-2019-0366

Source
https://advisories.mageia.org/MGASA-2019-0366.html
Import Source
https://advisories.mageia.org/MGASA-2019-0366.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2019-0366
Related
Published
2019-12-06T14:15:42Z
Modified
2019-12-06T13:43:25Z
Summary
Updated libtiff packages fix security vulnerability
Details

The updated packages fix a security vulnerability:

tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition (CVE-2019-17546).

References
Credits

Affected packages