Name | CVE-2019-17546 |
Description | tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2009-1, DLA-2147-1, DSA-4608-1, DSA-4670-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
gdal (PTS) | bullseye (security), bullseye | 3.2.2+dfsg-2+deb11u2 | fixed |
bookworm | 3.6.2+dfsg-1 | fixed | |
sid, trixie | 3.9.3+dfsg-1 | fixed | |
tiff (PTS) | bullseye (security), bullseye | 4.2.0-1+deb11u5 | fixed |
bookworm, bookworm (security) | 4.5.0-6+deb12u1 | fixed | |
sid, trixie | 4.5.1+git230720-5 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
gdal | source | jessie | 1.10.1+dfsg-8+deb8u2 | DLA-2147-1 | ||
gdal | source | (unstable) | 3.1.0+dfsg-1 | unimportant | ||
tiff | source | jessie | 4.0.3-12.3+deb8u10 | DLA-2009-1 | ||
tiff | source | stretch | 4.0.8-2+deb9u5 | DSA-4670-1 | ||
tiff | source | buster | 4.1.0+git191117-2~deb10u1 | DSA-4608-1 | ||
tiff | source | (unstable) | 4.0.10+git190818-1 |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16443
https://github.com/OSGeo/gdal/commit/21674033ee246f698887604c7af7ba1962a40ddf (v3.1.0RC1)
https://gitlab.com/libtiff/libtiff/commit/4bb584a35f87af42d6cf09d15e9ce8909a839145 (v4.1.0)
gdal uses system libtiff libraries since 2.0.1+dfsg-1~exp1 (#684233)