Fridrich Strba 2017-03-29 09:39:45 +00:00 committed by Git OBS Bridge
parent a44c766f4d
commit 7b44503774
3 changed files with 18 additions and 0 deletions

11
tiff-CVE-2016-10272.patch Normal file
View File

@ -0,0 +1,11 @@
--- a/tools/tiff2pdf.c
+++ b/tools/tiff2pdf.c
@@ -2895,7 +2895,7 @@ tsize_t t2p_readwrite_pdf_image_tile(T2P* t2p, TIFF* input, TIFF* output, ttile_
return(0);
}
if(TIFFGetField(input, TIFFTAG_JPEGTABLES, &count, &jpt) != 0) {
- if (count >= 4) {
+ if (count > 4) {
int retTIFFReadRawTile;
/* Ignore EOI marker of JpegTables */
_TIFFmemcpy(buffer, jpt, count - 2);

View File

@ -24,6 +24,11 @@ Wed Mar 29 07:55:02 UTC 2017 - fstrba@suse.com
attackers to cause a denial of service (heap-based buffer
over-read) or possibly have unspecified other impact via a
crafted TIFF image (bsc#1031250)
* tiff-CVE-2016-10272.patch
+ Upstream fix for CVE-2016-10272, LibTIFF 4.0.7 allows remote
attackers to cause a denial of service (heap-based buffer
overflow) or possibly have unspecified other impact via a
crafted TIFF image (bsc#1031247)
-------------------------------------------------------------------
Thu Feb 2 13:40:16 UTC 2017 - fstrba@suse.com

View File

@ -43,6 +43,7 @@ Patch7: tiff-CVE-2016-10267.patch
Patch8: tiff-CVE-2016-10268.patch
Patch9: tiff-CVE-2016-10269.patch
Patch10: tiff-CVE-2016-10270.patch
Patch12: tiff-CVE-2016-10272.patch
BuildRequires: gcc-c++
BuildRequires: libjpeg-devel
@ -114,6 +115,7 @@ the libtiff library.
%patch8 -p1
%patch9 -p1
%patch10 -p1
%patch12 -p1
%build
CFLAGS="%{optflags} -fPIE"