{"id":"MGASA-2016-0017","summary":"Updated libtiff package fixes security vulnerabilities","details":"In libtiff, in tif_next.c, a potential out-of-bound write in NeXTDecode()\ntriggered by the test case for CVE-2015-1547 (maptools bugzilla #2508).\n\nIn libtiff, in tif_getimage.c, out-of-bound reads in the TIFFRGBAImage\ninterface in case of unsupported values of SamplesPerPixel/ExtraSamples\nfor LogLUV / CIELab (CVE-2015-8665, CVE-2015-8683).\n","modified":"2026-04-16T06:25:33.595471978Z","published":"2016-01-14T01:44:39Z","upstream":["CVE-2015-1547","CVE-2015-8665","CVE-2015-8683"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0017.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15519"},{"type":"REPORT","url":"http://bugzilla.maptools.org/show_bug.cgi?id=2508"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2015/12/24/4"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2015/12/26/1"}],"affected":[{"package":{"name":"libtiff","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/libtiff?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.6-1.2.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0017.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}