Bug 1438458 (CVE-2016-10272) - CVE-2016-10272 libtiff: Heap-based buffer overflow in tif_next.c
Summary: CVE-2016-10272 libtiff: Heap-based buffer overflow in tif_next.c
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2016-10272
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1438466 1438464 1438465
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-04-03 13:05 UTC by Andrej Nemec
Modified: 2019-09-29 14:08 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-04-03 13:07:32 UTC


Attachments (Terms of Use)

Description Andrej Nemec 2017-04-03 13:05:43 UTC
A heap-buffer overflow vulnerability was found in libtiff. A maliciously crafted file could cause the application to crash.

Upstream patch:

https://github.com/vadz/libtiff/commit/9657bbe3cdce4aaa90e07d50c1c70ae52da0ba6a

References:

https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/

Comment 1 Andrej Nemec 2017-04-03 13:17:45 UTC
Created libtiff tracking bugs for this issue:

Affects: fedora-all [bug 1438464]


Created mingw-libtiff tracking bugs for this issue:

Affects: epel-7 [bug 1438466]
Affects: fedora-all [bug 1438465]


Note You need to log in before you can comment on or make changes to this bug.