summaryrefslogtreecommitdiffstats
path: root/main/tiff/libtiff-CVE-2009-2285.patch
diff options
context:
space:
mode:
authorNatanael Copa <ncopa@alpinelinux.org>2009-08-20 13:30:59 +0000
committerNatanael Copa <ncopa@alpinelinux.org>2009-08-20 13:30:59 +0000
commitbb3724aa4701bc30a93b8323a71ac578789cb784 (patch)
tree74be00b9d5f036b1e03497bfd8ebba6f2b210fa9 /main/tiff/libtiff-CVE-2009-2285.patch
parentf0404cc32bc2fee17dcc6c0badd7d42a9ba253ea (diff)
downloadaports-bb3724aa4701bc30a93b8323a71ac578789cb784.tar.bz2
aports-bb3724aa4701bc30a93b8323a71ac578789cb784.tar.xz
main/tiff: security patches
Diffstat (limited to 'main/tiff/libtiff-CVE-2009-2285.patch')
-rw-r--r--main/tiff/libtiff-CVE-2009-2285.patch22
1 files changed, 22 insertions, 0 deletions
diff --git a/main/tiff/libtiff-CVE-2009-2285.patch b/main/tiff/libtiff-CVE-2009-2285.patch
new file mode 100644
index 00000000..435a84b5
--- /dev/null
+++ b/main/tiff/libtiff-CVE-2009-2285.patch
@@ -0,0 +1,22 @@
+Index: tiff-3.8.2/libtiff/tif_lzw.c
+===================================================================
+--- tiff-3.8.2.orig/libtiff/tif_lzw.c
++++ tiff-3.8.2/libtiff/tif_lzw.c
+@@ -421,7 +421,7 @@ LZWDecode(TIFF* tif, tidata_t op0, tsize
+ NextCode(tif, sp, bp, code, GetNextCode);
+ if (code == CODE_EOI)
+ break;
+- if (code == CODE_CLEAR) {
++ if (code >= CODE_CLEAR) {
+ TIFFErrorExt(tif->tif_clientdata, tif->tif_name,
+ "LZWDecode: Corrupted LZW table at scanline %d",
+ tif->tif_row);
+@@ -624,7 +624,7 @@ LZWDecodeCompat(TIFF* tif, tidata_t op0,
+ NextCode(tif, sp, bp, code, GetNextCodeCompat);
+ if (code == CODE_EOI)
+ break;
+- if (code == CODE_CLEAR) {
++ if (code >= CODE_CLEAR) {
+ TIFFErrorExt(tif->tif_clientdata, tif->tif_name,
+ "LZWDecode: Corrupted LZW table at scanline %d",
+ tif->tif_row);