Mageia 2019-0366: libtiff security update
Summary
The updated packages fix a security vulnerability:
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1
and other products, has an integer overflow that potentially causes a
heap-based buffer overflow via a crafted RGBA image, related to a
"Negative-size-param" condition (CVE-2019-17546).
References
- https://bugs.mageia.org/show_bug.cgi?id=25777
- https://www.debian.org/lts/security/2019/dla-2009
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17546
Resolution
MGASA-2019-0366 - Updated libtiff packages fix security vulnerability
SRPMS
- 7/core/libtiff-4.1.0-2.git20191120.1.mga7