diff options
author | Ming Liu <ming.liu@windriver.com> | 2013-12-05 17:52:14 -0600 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2013-12-10 11:36:23 +0000 |
commit | 9db7a897d216a8293152c1a3b96c72b699d469c7 (patch) | |
tree | eecdaf1a1ce4b4a2580dda9af0dd8250fb5c0573 /meta/recipes-multimedia/libtiff/tiff_4.0.3.bb | |
parent | d142fcea02438e06338a1d1a5644667fdda59172 (diff) | |
download | openembedded-core-contrib-9db7a897d216a8293152c1a3b96c72b699d469c7.tar.gz |
libtiff: fix CVE-2013-1960
Heap-based buffer overflow in the tp_process_jpeg_strip function in tiff2pdf
in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of
service (crash) and possibly execute arbitrary code via a crafted TIFF image
file.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1960
Signed-off-by: Ming Liu <ming.liu@windriver.com>
Signed-off-by: Jeff Polk <jeff.polk@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-multimedia/libtiff/tiff_4.0.3.bb')
-rw-r--r-- | meta/recipes-multimedia/libtiff/tiff_4.0.3.bb | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/meta/recipes-multimedia/libtiff/tiff_4.0.3.bb b/meta/recipes-multimedia/libtiff/tiff_4.0.3.bb index c90b4b29ac..def408e574 100644 --- a/meta/recipes-multimedia/libtiff/tiff_4.0.3.bb +++ b/meta/recipes-multimedia/libtiff/tiff_4.0.3.bb @@ -5,7 +5,8 @@ HOMEPAGE = "http://www.remotesensing.org/libtiff/" DEPENDS = "zlib jpeg xz" SRC_URI = "ftp://ftp.remotesensing.org/pub/libtiff/tiff-${PV}.tar.gz \ - file://libtool2.patch" + file://libtool2.patch \ + file://libtiff-CVE-2013-1960.patch" SRC_URI[md5sum] = "051c1068e6a0627f461948c365290410" SRC_URI[sha256sum] = "ea1aebe282319537fb2d4d7805f478dd4e0e05c33d0928baba76a7c963684872" |