Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 09 Sep 2016 15:59:04 +0200
From: Agostino Sarubbo <>
Cc: Bob Friesenhahn <>
Subject: Re: GraphicsMagick 1.3.25 fixes some security issues

On Tuesday 06 September 2016 20:50:23 Bob Friesenhahn wrote:
> 4. The TIFF reader had a bug pertaining to use of TIFFGetField() when 
> a 'count' value is returned.  The bug caused a heap read overflow (due 
> to using strlcpy() to copy a possibly unterminated string) which could 
> allow an untrusted file to crash the software.

For who is interested, the details of the issue N° 4 are documented here:[1] 

The same block of code, which was rewritten because of the overflows, 
contains also a null pointer access:[2] 

Unfortunately this problem was not reproducible by Mr Friesenhahn, but 
seems to be disappeared after the commit which fixed the overflows.



Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ