Bug 1530912 (CVE-2017-17973)
Summary: | CVE-2017-17973 libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sam Fowler <sfowler> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | nforro, phracek, tgl |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2018-01-22 03:52:35 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1530913, 1910610 | ||
Bug Blocks: | 1530914 |
Description
Sam Fowler
2018-01-04 06:55:52 UTC
Created libtiff tracking bugs for this issue: Affects: fedora-all [bug 1530913] Analysis: I am not able to reproduce this on any version of libtiff shipped with Red Hat Enterprise Linux or with the upstream version compiled with ASAN. Currently there is no response from upstream nor any response from the reporter of this flaw. I am going to mark this issue as notaffected, until there is more information available. |