summaryrefslogtreecommitdiffstats
path: root/meta/recipes-graphics/freetype/freetype-2.4.9/CVE-2012-5669.patch
diff options
context:
space:
mode:
authorScott Garman <scott.a.garman@intel.com>2012-12-27 14:48:56 -0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2013-01-03 12:34:25 +0000
commit156c2554b76cde2d6d9350aaaf9848986201375d (patch)
tree55325615f9a104ab15c9b49d6b0c94821b5530f0 /meta/recipes-graphics/freetype/freetype-2.4.9/CVE-2012-5669.patch
parentb6037b6d2fc9cb4e8a3564468da0f796ed9235d8 (diff)
downloadpoky-156c2554b76cde2d6d9350aaaf9848986201375d.tar.gz
freetype: patches for CVE-2012-5668, 5669, and 5670
For details of these security issues, please see: http://www.openwall.com/lists/oss-security/2012/12/25/1 Thanks to Eren Turkay <eren@hambedded.org> for submitting source patches that apply cleanly to freetype 2.4.9. This fixes denzil bug [YOCTO #3649] (From OE-Core rev: be34916d81b71385a560a6990c7b30eba243b356) Signed-off-by: Scott Garman <scott.a.garman@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-graphics/freetype/freetype-2.4.9/CVE-2012-5669.patch')
-rw-r--r--meta/recipes-graphics/freetype/freetype-2.4.9/CVE-2012-5669.patch31
1 files changed, 31 insertions, 0 deletions
diff --git a/meta/recipes-graphics/freetype/freetype-2.4.9/CVE-2012-5669.patch b/meta/recipes-graphics/freetype/freetype-2.4.9/CVE-2012-5669.patch
new file mode 100644
index 0000000000..e4a991e984
--- /dev/null
+++ b/meta/recipes-graphics/freetype/freetype-2.4.9/CVE-2012-5669.patch
@@ -0,0 +1,31 @@
1From 07bdb6e289c7954e2a533039dc93c1c136099d2d Mon Sep 17 00:00:00 2001
2From: Werner Lemberg <wl@gnu.org>
3Date: Sat, 15 Dec 2012 01:02:23 +0000
4Subject: [bdf] Fix Savannah bug #37906.
5
6* src/bdf/bdflib.c (_bdf_parse_glyphs): Use correct array size for
7checking `glyph_enc'.
8
9Upstream-Status: Pending
10
11Signed-off-by: Eren Turkay <eren@hambedded.org>
12Signed-off-by: Scott Garman <scott.a.garman@intel.com>
13---
14diff --git a/src/bdf/bdflib.c b/src/bdf/bdflib.c
15index 8d7f9a0..f9c06ca 100644
16--- a/src/bdf/bdflib.c
17+++ b/src/bdf/bdflib.c
18@@ -1628,8 +1628,9 @@
19
20 /* Check that the encoding is in the Unicode range because */
21 /* otherwise p->have (a bitmap with static size) overflows. */
22- if ( p->glyph_enc > 0 &&
23- (size_t)p->glyph_enc >= sizeof ( p->have ) * 8 )
24+ if ( p->glyph_enc > 0 &&
25+ (size_t)p->glyph_enc >= sizeof ( p->have ) /
26+ sizeof ( unsigned long ) * 32 )
27 {
28 FT_ERROR(( "_bdf_parse_glyphs: " ERRMSG5, lineno, "ENCODING" ));
29 error = BDF_Err_Invalid_File_Format;
30--
31cgit v0.9.0.2