From 5a3821aec094b38a412cf5e6997c08b6428d6f77 Mon Sep 17 00:00:00 2001 From: root Date: Fri, 25 Oct 2013 02:08:36 -0700 Subject: Fri Oct 25 02:07:10 PDT 2013 --- extra/libtiff/libtiff-CVE-2013-4244.patch | 15 +++++++++++++++ 1 file changed, 15 insertions(+) create mode 100644 extra/libtiff/libtiff-CVE-2013-4244.patch (limited to 'extra/libtiff/libtiff-CVE-2013-4244.patch') diff --git a/extra/libtiff/libtiff-CVE-2013-4244.patch b/extra/libtiff/libtiff-CVE-2013-4244.patch new file mode 100644 index 000000000..792e07698 --- /dev/null +++ b/extra/libtiff/libtiff-CVE-2013-4244.patch @@ -0,0 +1,15 @@ +diff --git a/tools/gif2tiff.c b/tools/gif2tiff.c +index 375b152..2731273 100644 +--- a/tools/gif2tiff.c ++++ b/tools/gif2tiff.c +@@ -402,6 +402,10 @@ process(register int code, unsigned char** fill) + } + + if (oldcode == -1) { ++ if (code >= clear) { ++ fprintf(stderr, "bad input: code=%d is larger than clear=%d\n",code, clear); ++ return 0; ++ } + *(*fill)++ = suffix[code]; + firstchar = oldcode = code; + return 1; -- cgit v1.2.3-54-g00ecf