summaryrefslogtreecommitdiffstats
path: root/meta/recipes-graphics/harfbuzz
diff options
context:
space:
mode:
authorBaogen Shang <baogen.shang@windriver.com>2013-10-21 11:03:41 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2013-12-12 17:00:25 +0000
commit5f0074f02299c153cef501bdf6fb77dfb6e17ee5 (patch)
treebcd4b3cf6609e36271de5a871da5c6a7271a0463 /meta/recipes-graphics/harfbuzz
parent393228723188fbd6ddc93c45b881410370e1306c (diff)
downloadpoky-5f0074f02299c153cef501bdf6fb77dfb6e17ee5.tar.gz
libtiff: CVE-2013-4243
cve description: Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4243 (From OE-Core rev: a2a200a3951cecd7dd43dee360e0260051c97416) Signed-off-by: Baogen Shang <baogen.shang@windriver.com> Signed-off-by: Mark Hatle <mark.hatle@windriver.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-graphics/harfbuzz')
0 files changed, 0 insertions, 0 deletions