summaryrefslogtreecommitdiffstats
path: root/meta/recipes-multimedia/libtiff/tiff/0002-tiffcrop-fix-issue-380-and-382-heap-buffer-overflow-.patch
diff options
context:
space:
mode:
authorRichard Purdie <richard.purdie@linuxfoundation.org>2022-04-12 11:01:51 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2022-04-12 16:39:27 +0100
commit1b8513c1abdcd6430f9311efd04d785488f79d7d (patch)
treef4c7e4a2fc2e799927850b3de330586a60074b3e /meta/recipes-multimedia/libtiff/tiff/0002-tiffcrop-fix-issue-380-and-382-heap-buffer-overflow-.patch
parent407744b00d702e3133304e1b43064a5634ca02cf (diff)
downloadopenembedded-core-1b8513c1abdcd6430f9311efd04d785488f79d7d.tar.gz
qemu: Add fix for CVE-2022-1050
Add a fix queued upstream for the issue in this CVE: """ Guest driver might execute HW commands when shared buffers are not yet allocated. This might happen on purpose (malicious guest) or because some other guest/host address mapping. We need to protect againts such case. """ Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-multimedia/libtiff/tiff/0002-tiffcrop-fix-issue-380-and-382-heap-buffer-overflow-.patch')
0 files changed, 0 insertions, 0 deletions