CVE-2019-6128

The TIFFFdOpen function in tif_unix.c in LibTIFF 4.0.10 has a memory leak, as demonstrated by pal2rgb.
References
Link Resource
http://bugzilla.maptools.org/show_bug.cgi?id=2836 Exploit Issue Tracking Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html Third Party Advisory VDB Entry
https://gitlab.com/libtiff/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Nov/5 Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202003-25 Third Party Advisory
https://usn.ubuntu.com/3906-1/ Third Party Advisory
https://usn.ubuntu.com/3906-2/ Third Party Advisory
http://bugzilla.maptools.org/show_bug.cgi?id=2836 Exploit Issue Tracking Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html Third Party Advisory VDB Entry
https://gitlab.com/libtiff/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Nov/5 Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202003-25 Third Party Advisory
https://usn.ubuntu.com/3906-1/ Third Party Advisory
https://usn.ubuntu.com/3906-2/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:libtiff:libtiff:4.0.10:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:45

Type Values Removed Values Added
References () http://bugzilla.maptools.org/show_bug.cgi?id=2836 - Exploit, Issue Tracking, Third Party Advisory () http://bugzilla.maptools.org/show_bug.cgi?id=2836 - Exploit, Issue Tracking, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html - Mailing List, Third Party Advisory
References () http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html - Third Party Advisory, VDB Entry
References () https://gitlab.com/libtiff/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8 - Patch, Third Party Advisory () https://gitlab.com/libtiff/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html - Mailing List, Third Party Advisory
References () https://seclists.org/bugtraq/2019/Nov/5 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/Nov/5 - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202003-25 - Third Party Advisory () https://security.gentoo.org/glsa/202003-25 - Third Party Advisory
References () https://usn.ubuntu.com/3906-1/ - Third Party Advisory () https://usn.ubuntu.com/3906-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3906-2/ - Third Party Advisory () https://usn.ubuntu.com/3906-2/ - Third Party Advisory

Information

Published : 2019-01-11 05:29

Updated : 2024-11-21 04:45


NVD link : CVE-2019-6128

Mitre link : CVE-2019-6128

CVE.ORG link : CVE-2019-6128


JSON object : View

Products Affected

canonical

  • ubuntu_linux

libtiff

  • libtiff

debian

  • debian_linux

opensuse

  • leap
CWE
CWE-401

Missing Release of Memory after Effective Lifetime