diff options
author | Catalin Enache <catalin.enache@windriver.com> | 2017-04-06 14:08:36 +0300 |
---|---|---|
committer | Martin Jansa <Martin.Jansa@gmail.com> | 2017-04-18 14:21:38 +0200 |
commit | f882211c14507894248bb4ff064153b242d1d9d7 (patch) | |
tree | 0b8edd0d3881228e68b0643a1e2fc5540e9e8228 /meta-python/recipes-devtools | |
parent | eb97a736f339c70a102cc07871be7da3b711b68c (diff) | |
download | meta-openembedded-contrib-f882211c14507894248bb4ff064153b242d1d9d7.tar.gz |
gd : CVE-2016-10166
Integer underflow in the _gdContributionsAlloc function in gd_interpolation.c
in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers
to have unspecified impact via vectors related to decrementing the u variable.
Reference:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10166
Upstream patch:
https://github.com/libgd/libgd/commit/60bfb401ad5a4a8ae995dcd36372fe15c71e1a35
Signed-off-by: Catalin Enache <catalin.enache@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools')
0 files changed, 0 insertions, 0 deletions