Security update for tiff

This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2018-19210: Fixed NULL pointer dereference in the TIFFWriteDirectorySec function (bsc#1115717).
- CVE-2017-12944: Fixed denial of service issue in the TIFFReadDirEntryArray function (bsc#1054594).
- CVE-2016-10094: Fixed heap-based buffer overflow in the _tiffWriteProc function (bsc#1017693).
- CVE-2016-10093: Fixed heap-based buffer overflow in the _TIFFmemcpy function (bsc#1017693).
- CVE-2016-10092: Fixed heap-based buffer overflow in the TIFFReverseBits function (bsc#1017693).
- CVE-2016-6223: Fixed out-of-bounds read on memory-mapped files in TIFFReadRawStrip1() and TIFFReadRawTile1() (bsc#990460).

This update was imported from the SUSE:SLE-15:Update update project.

Fixed bugs
bnc#1115717
VUL-1: CVE-2018-19210: tiff: NULL pointer dereference in the TIFFWriteDirectorySec function in tif_dirwrite.c
bnc#990460
VUL-1: CVE-2016-6223: tiff: Out-of-bounds read on memory-mapped files in TIFFReadRawStrip1() and TIFFReadRawTile1()
bnc#1017693
VUL-0: CVE-2016-10092, CVE-2016-10093, CVE-2016-10094: libtiff: multiple heap-based buffer overflow
bnc#1054594
VUL-1: CVE-2017-12944: tiff: The TIFFReadDirEntryArray function in tif_read.c in LibTIFF 4.0.8 mishandlesmemory allocation for short files, which allows remote attackers to cause adenial of service (allocation failure and application cras
Selected Binaries
openSUSE Build Service is sponsored by