Vulnerability Database
Blog
FAQ
Docs
MGASA-2022-0284
See a problem?
Please try reporting it
to the source
first.
Source
https://advisories.mageia.org/MGASA-2022-0284.html
Import Source
https://advisories.mageia.org/MGASA-2022-0284.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0284
Related
CVE-2022-34526
Published
2022-08-13T02:32:35Z
Modified
2022-08-13T01:14:11Z
Summary
Updated libtiff packages fix security vulnerability
Details
A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit (CVE-2022-34526)
References
https://advisories.mageia.org/MGASA-2022-0284.html
https://bugs.mageia.org/show_bug.cgi?id=30716
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/FC6LWPAEKYJ57LSHX4SBFMLRMLOZTHIJ/
Credits
Mageia - COORDINATOR
https://wiki.mageia.org/en/Packages_Security_Team
Affected packages
MGASA-2022-0284 - OSV