DescriptionVasyl Kaigorodov
2015-02-09 13:54:36 UTC
Below issues were reported [1] and fixed upstream in libtiff:
- uninitialized memory in putcontig8bitYCbCr21tile
Fixed in:
2014-12-29 Even Rouault <even.rouault () spatialys com>
* libtiff/tif_getimage.c: in OJPEG case, fix checks on strile width/height
in the putcontig8bitYCbCr42tile, putcontig8bitYCbCr41tile and
putcontig8bitYCbCr21tile cases.
- uninitialized memory in NeXTDecode
Fixed in:
2014-12-29 Even Rouault <even.rouault () spatialys com>
* libtiff/tif_next.c: add new tests to check that we don't read outside of
the compressed input stream buffer.
[1]: http://seclists.org/oss-sec/2015/q1/454
Statement:
This issue affects the version of libtiff package as shipped with Red Hat Enterprise Linux 5, 6 and 7. A further update may address this flaw in Red Hat Enterprise Linux 6 and 7.
Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates.
Below issues were reported [1] and fixed upstream in libtiff: - uninitialized memory in putcontig8bitYCbCr21tile Fixed in: 2014-12-29 Even Rouault <even.rouault () spatialys com> * libtiff/tif_getimage.c: in OJPEG case, fix checks on strile width/height in the putcontig8bitYCbCr42tile, putcontig8bitYCbCr41tile and putcontig8bitYCbCr21tile cases. - uninitialized memory in NeXTDecode Fixed in: 2014-12-29 Even Rouault <even.rouault () spatialys com> * libtiff/tif_next.c: add new tests to check that we don't read outside of the compressed input stream buffer. [1]: http://seclists.org/oss-sec/2015/q1/454