diff options
author | wiz <wiz> | 2012-07-19 21:41:45 +0000 |
---|---|---|
committer | wiz <wiz> | 2012-07-19 21:41:45 +0000 |
commit | 0822502ebe6d94eaf5371bf12d31d9dcf88fa61e (patch) | |
tree | 220fb6741df98b64ce8a9dacfe4007935c28aefc /graphics/tiff/patches | |
parent | f92a9d4f0c1708f7283d8cfcf9db431eaa15f8a0 (diff) | |
download | pkgsrc-0822502ebe6d94eaf5371bf12d31d9dcf88fa61e.tar.gz |
Fix CVE-2012-3401, buffer overflow in tiff2pdf.
Bump PKGREVISION.
Diffstat (limited to 'graphics/tiff/patches')
-rw-r--r-- | graphics/tiff/patches/patch-tools_tiff2pdf.c | 14 |
1 files changed, 14 insertions, 0 deletions
diff --git a/graphics/tiff/patches/patch-tools_tiff2pdf.c b/graphics/tiff/patches/patch-tools_tiff2pdf.c new file mode 100644 index 00000000000..7cfe7943acf --- /dev/null +++ b/graphics/tiff/patches/patch-tools_tiff2pdf.c @@ -0,0 +1,14 @@ +$NetBSD: patch-tools_tiff2pdf.c,v 1.1 2012/07/19 21:41:45 wiz Exp $ + +CVE-2012-3401, buffer overflow in tiff2pdf + +--- tools/tiff2pdf.c.orig 2012-06-15 21:51:54.000000000 +0000 ++++ tools/tiff2pdf.c +@@ -1066,6 +1066,7 @@ void t2p_read_tiff_init(T2P* t2p, TIFF* + "Can't set directory %u of input file %s", + i, + TIFFFileName(input)); ++ t2p->t2p_error = T2P_ERR_ERROR; + return; + } + if(TIFFGetField(input, TIFFTAG_PAGENUMBER, &pagen, &paged)){ |