MGASA-2024-0077

Source
https://advisories.mageia.org/MGASA-2024-0077.html
Import Source
https://advisories.mageia.org/MGASA-2024-0077.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0077
Related
Published
2024-03-20T21:19:08Z
Modified
2024-03-20T21:04:26Z
Summary
Updated libtiff packages fix security vulnerabilities
Details

LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow. (CVE-2023-40745) A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow. (CVE-2023-41175)

References
Credits

Affected packages

Mageia:9 / libtiff

Package

Name
libtiff
Purl
pkg:rpm/mageia/libtiff?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.1-1.2.mga9

Ecosystem specific

{
    "section": "core"
}