Mageia 2019-0101: libtiff security update
Summary
An Invalid Address dereference was discovered in
TIFFWriteDirectoryTagTransferfunction in libtiff/tif_dirwrite.c in LibTIFF
4.0.10, affecting the cpSeparateBufToContigBuf function in tiffcp.c.
Remote attackers could leverage this vulnerability to cause a
denial-of-service via a crafted tiff file. This is different from
CVE-2018-12900. (CVE-2019-7663)
The invertImage() function in tiffcrop.c:9206 allows remote attackers to
cause a denial of service (heap buffer overflow) via invert color space.
References
- https://bugs.mageia.org/show_bug.cgi?id=24393
- http://bugzilla.maptools.org/show_bug.cgi?id=2831
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/QLLVSXFUKP2QSOFI6RRTYD737HBS7UGT/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7663
Resolution
MGASA-2019-0101 - Updated libtiff packages fix security vulnerability
SRPMS
- 6/core/libtiff-4.0.10-1.git20190219.1.mga6