A heap-buffer overflow vulnerability was found in libtiff in the tools/tiffcp. Using a maliciously crafted BitsPerSample value could cause the application to crash or possibly allow code execution. Upstream bugs: http://bugzilla.maptools.org/show_bug.cgi?id=2656 http://bugzilla.maptools.org/show_bug.cgi?id=2657 Upstream patch: https://github.com/vadz/libtiff/commit/5c080298d59efa53264d7248bbe3a04660db6ef7
CVE-2017-5225 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5225): LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample value.
pulled in 4.0.7-r1 https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f61e94523aef88e99d1140307b83bd518a450a14
This issue was resolved and addressed in GLSA 201709-27 at https://security.gentoo.org/glsa/201709-27 by GLSA coordinator Aaron Bauman (b-man).