Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 18 Nov 2016 16:33:15 +0800
From: ChenQin <chenqin@...sec.com.cn>
To: oss-security@...ts.openwall.com
Subject: CVE Request: libtiff: Out-of-bounds Write memcpy and less bound check in tiff2pdf

http://bugzilla.maptools.org/show_bug.cgi?id=2579 <http://bugzilla.maptools.org/show_bug.cgi?id=2579>
fixed:
  * tools/tiff2pdf.c: fix read -largely- outsize of buffer in
        t2p_readwrite_pdf_image_tile(), causing crash, when reading a
        JPEG compressed image with TIFFTAG_JPEGTABLES length being one.
        Reported as MSVR 35101 by Axel Souchet and Vishal Chauhan from
        the MSRC Vulnerabilities & Mitigations team.


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ