Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 9 Nov 2016 20:41:09 -0600 (CST)
From: Bob Friesenhahn <>
Subject: Re: Re: CVE Request: libtiff: heap buffer overflow/read
 outside of array

On Wed, 9 Nov 2016, Ian Zimmerman wrote:

> On 2016-11-09 17:32, Brian 'geeknik' Carpenter wrote:
>> Fixed per
>>>> 2016-11-10 Even Rouault <even.rouault at>
> I tried to check out the sources to patch this for myself, following the
> recipe from the webpage:

At the moment, "the web page" should be one of:

And this is the description of how to obtain files from CVS:

cvs login
(use empty password)
cvs checkout libtiff
to get the stable libtiff code

Bob Friesenhahn,
GraphicsMagick Maintainer,

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ