Quoting ${URL}: There is a heap based buffer overflow in tools/tiff2pdf.c of LibTIFF 4.0.8 via a PlanarConfig=Contig image, which causes a more than one hundred bytes out-of-bounds write (related to the ZIPDecode function in tif_zip.c). A crafted input may lead to a remote denial of service attack or an arbitrary code execution attack. Supposed upstream fix: https://github.com/vadz/libtiff/commit/69bfeec247899776b1b396651adb47436e5f1556 Reproducible: Always
@arches, please stabilize.
amd64 stable
ia64 stable
x86 stable
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=542781819736c4c792791801438b72d42aafb105 commit 542781819736c4c792791801438b72d42aafb105 Author: Rolf Eike Beer <eike@sf-mail.de> AuthorDate: 2018-03-28 18:35:15 +0000 Commit: Sergei Trofimovich <slyfox@gentoo.org> CommitDate: 2018-03-28 19:32:16 +0000 media-libs/tiff: stable 4.0.9-r3 for sparc Bug: https://bugs.gentoo.org/645980 Package-Manager: Portage-2.3.24, Repoman-2.3.6 RepoMan-Options: --include-arches="sparc" media-libs/tiff/tiff-4.0.9-r3.ebuild | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)}
arm64 stable
ppc64 stable
Stable on alpha.
ppc stable
arm stable
hppa stable
cleanup and glsa will happen in bug 624696