CVE-2019-17546

NameCVE-2019-17546
Descriptiontif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2009-1
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gdal (PTS)jessie1.10.1+dfsg-8vulnerable
jessie (security)1.10.1+dfsg-8+deb8u1vulnerable
stretch2.1.2+dfsg-5vulnerable
buster2.4.0+dfsg-1vulnerable
bullseye, sid2.4.3+dfsg-1vulnerable
tiff (PTS)jessie4.0.3-12.3+deb8u5vulnerable
jessie (security)4.0.3-12.3+deb8u10fixed
stretch (security), stretch4.0.8-2+deb9u4vulnerable
buster4.0.10-4vulnerable
bullseye, sid4.1.0+git191117-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gdalsource(unstable)(unfixed)unimportant
tiffsource(unstable)4.0.10+git190818-1
tiffsourcejessie4.0.3-12.3+deb8u10DLA-2009-1

Notes

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16443
https://github.com/OSGeo/gdal/commit/21674033ee246f698887604c7af7ba1962a40ddf
https://gitlab.com/libtiff/libtiff/commit/4bb584a35f87af42d6cf09d15e9ce8909a839145
gdal uses system libtiff libraries since 2.0.1+dfsg-1~exp1 (#684233)

Search for package or bug name: Reporting problems