A divide-by-zero vulnerability was found in libtiff. A maliciously crafted file could cause the application to crash. Upstream patch: https://github.com/vadz/libtiff/commit/438274f938e046d33cb0e1230b41da32ffe223e1 Upstream bug: http://bugzilla.maptools.org/show_bug.cgi?id=2596
Created libtiff tracking bugs for this issue: Affects: fedora-all [bug 1438464] Created mingw-libtiff tracking bugs for this issue: Affects: epel-7 [bug 1438466] Affects: fedora-all [bug 1438465]
Hi Is this a duplicate of CVE-2016-10266?
(In reply to Salvatore Bonaccorso from comment #2) > Hi > > Is this a duplicate of CVE-2016-10266? Looks like I mispunched 3 instead of 6 at the end of a CVE number... Thanks for spotting it, I will close it as a duplicate. *** This bug has been marked as a duplicate of bug 1438472 ***
Hi Andrej, Perfect thank you for the quick confirmation! Regards, Salvatore