Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2020-4634

Опубликовано: 10 нояб. 2020
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2020-4634: libtiff security update (MODERATE)

[4.0.9-18]

  • Fix CVE-2019-17546 (#1771372)

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

libtiff

4.0.9-18.el8

libtiff-devel

4.0.9-18.el8

libtiff-tools

4.0.9-18.el8

Oracle Linux x86_64

libtiff

4.0.9-18.el8

libtiff-devel

4.0.9-18.el8

libtiff-tools

4.0.9-18.el8

Связанные CVE

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 6 лет назад

tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.

CVSS3: 8.8
redhat
около 6 лет назад

tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.

CVSS3: 8.8
nvd
почти 6 лет назад

tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.

CVSS3: 8.8
debian
почти 6 лет назад

tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0. ...

CVSS3: 8.8
github
около 3 лет назад

tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.