MGASA-2024-0287

Source
https://advisories.mageia.org/MGASA-2024-0287.html
Import Source
https://advisories.mageia.org/MGASA-2024-0287.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0287
Related
Published
2024-09-10T16:40:31Z
Modified
2024-09-10T16:12:06Z
Summary
Updated libtiff packages fix security vulnerability
Details

A null pointer dereference flaw was found in Libtiff via tif_dirinfo.c. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service. (CVE-2024-7006)

References
Credits

Affected packages

Mageia:9 / libtiff

Package

Name
libtiff
Purl
pkg:rpm/mageia/libtiff?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.1-1.5.mga9

Ecosystem specific

{
    "section": "core"
}