An out-of-bounds read vulnerability on memory-mapped files in TIFFReadRawStrip1() and TIFFReadRawTile1() when stripoffset is beyond tmsize_t max value was found. The vulnerability allows an attacker to specify a negative index into the file-content buffer and copy data from that position until the end of the buffer. This will allow an attacker to crash the process by accessing unmapped memory and (depending on how LibTIFF is used) might also allow an attacker to leak sensitive information. Fixed by commit with commitid: YhOZoKv5OA9gNNdz; CVE assignment: http://seclists.org/oss-sec/2016/q3/67
Created libtiff tracking bugs for this issue: Affects: fedora-all [bug 1356869]
Created mingw-libtiff tracking bugs for this issue: Affects: fedora-all [bug 1356870] Affects: epel-all [bug 1356871]
Upstream patch: https://github.com/vadz/libtiff/commit/0ba5d8814a17a64bdb8d9035f4c533f3f3f4b496