Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP5:GA
patchinfo.7389
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.7389
<patchinfo incident="7389"> <issue tracker="bnc" id="1074318">VUL-0: CVE-2017-17973: tiff: In LibTIFF 4.0.8, there is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c.</issue> <issue tracker="bnc" id="1046077">VUL-0: CVE-2017-9935: tiff: Heap-based buffer overflow in t2p_write_pdf</issue> <issue tracker="bnc" id="1081690">VUL-0: CVE-2018-5784: tiff: uncontrolled resource consumption in TIFFSetDirectory function in tif_dir.c</issue> <issue tracker="cve" id="2017-9935"/> <issue tracker="cve" id="2017-17973"/> <issue tracker="cve" id="2018-5784"/> <category>security</category> <rating>moderate</rating> <packager>mvetter</packager> <description>This update for tiff fixes the following issues: - CVE-2017-9935: There was a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution (bsc#1046077) - CVE-2017-17973: There is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. (bsc#1074318) - CVE-2018-5784: There is an uncontrolled resource consumption in the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file. This occurs because the declared number of directory entries is not validated against the actual number of directory entries (bsc#1081690) </description> <summary>Security update for tiff</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor