CVE-2019-17546

NameCVE-2019-17546
Descriptiontif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2009-1, DLA-2147-1, DSA-4608-1, DSA-4670-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gdal (PTS)jessie, jessie (lts)1.10.1+dfsg-8+deb8u3fixed
stretch (security), stretch (lts), stretch2.1.2+dfsg-5+deb9u1vulnerable
buster (security), buster, buster (lts)2.4.0+dfsg-1+deb10u1vulnerable
bullseye (security), bullseye3.2.2+dfsg-2+deb11u2fixed
bookworm3.6.2+dfsg-1fixed
sid, trixie3.9.3+dfsg-1fixed
tiff (PTS)jessie, jessie (lts)4.0.3-12.3+deb8u17fixed
stretch (security)4.0.8-2+deb9u8fixed
stretch (lts), stretch4.0.8-2+deb9u12fixed
buster (security), buster, buster (lts)4.1.0+git191117-2~deb10u9fixed
bullseye (security), bullseye4.2.0-1+deb11u5fixed
bookworm (security), bookworm4.5.0-6+deb12u1fixed
sid, trixie4.5.1+git230720-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gdalsourcejessie1.10.1+dfsg-8+deb8u2DLA-2147-1
gdalsource(unstable)3.1.0+dfsg-1unimportant
tiffsourcejessie4.0.3-12.3+deb8u10DLA-2009-1
tiffsourcestretch4.0.8-2+deb9u5DSA-4670-1
tiffsourcebuster4.1.0+git191117-2~deb10u1DSA-4608-1
tiffsource(unstable)4.0.10+git190818-1

Notes

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16443
https://github.com/OSGeo/gdal/commit/21674033ee246f698887604c7af7ba1962a40ddf (v3.1.0RC1)
https://gitlab.com/libtiff/libtiff/commit/4bb584a35f87af42d6cf09d15e9ce8909a839145 (v4.1.0)
gdal uses system libtiff libraries since 2.0.1+dfsg-1~exp1 (#684233)

Search for package or bug name: Reporting problems