diff options
author | Rajkumar Veer <rveer@mvista.com> | 2017-11-03 21:35:16 -0700 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2017-11-05 22:39:24 +0000 |
commit | d358e9bda3dcbdcfff7008804099f89f97f8bf79 (patch) | |
tree | 6a5c5cc5cbf4ce1e48d1d3ffafaafd355d215d88 /meta/recipes-multimedia/libtiff/files/CVE-2016-10271.patch | |
parent | fe734c3adddef18e1dade182eb77c6d3c923e498 (diff) | |
download | openembedded-core-d358e9bda3dcbdcfff7008804099f89f97f8bf79.tar.gz |
tiff: Security fix for CVE-2016-10271
Signed-off-by: Rajkumar Veer <rveer@mvista.com>
Signed-off-by: Armin Kuster <akuster@mvista.com>
Diffstat (limited to 'meta/recipes-multimedia/libtiff/files/CVE-2016-10271.patch')
-rw-r--r-- | meta/recipes-multimedia/libtiff/files/CVE-2016-10271.patch | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/libtiff/files/CVE-2016-10271.patch b/meta/recipes-multimedia/libtiff/files/CVE-2016-10271.patch new file mode 100644 index 0000000000..4fe5bcd6c7 --- /dev/null +++ b/meta/recipes-multimedia/libtiff/files/CVE-2016-10271.patch @@ -0,0 +1,30 @@ +From 9657bbe3cdce4aaa90e07d50c1c70ae52da0ba6a Mon Sep 17 00:00:00 2001 +From: erouault <erouault> +Date: Sat, 3 Dec 2016 11:35:56 +0000 +Subject: [PATCH] * tools/tiffcrop.c: fix readContigStripsIntoBuffer() in -i + (ignore) mode so that the output buffer is correctly incremented to avoid + write outside bounds. Reported by Agostino Sarubbo. Fixes + http://bugzilla.maptools.org/show_bug.cgi?id=2620 + +Upstream-Status: Backport +CVE: CVE-2016-10271 +Signed-off-by: Rajkumar Veer <rveer@mvista.com> + +--- + ChangeLog | 7 +++++++ + tools/tiffcrop.c | 2 +- + 2 files changed, 8 insertions(+), 1 deletion(-) + +Index: tiff-4.0.7/tools/tiffcrop.c +=================================================================== +--- tiff-4.0.7.orig/tools/tiffcrop.c ++++ tiff-4.0.7/tools/tiffcrop.c +@@ -3698,7 +3698,7 @@ static int readContigStripsIntoBuffer (T + (unsigned long) strip, (unsigned long)rows); + return 0; + } +- bufp += bytes_read; ++ bufp += stripsize; + } + + return 1; |