diff options
author | Li Zhou <li.zhou@windriver.com> | 2017-01-25 17:28:22 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2017-11-21 14:43:53 +0000 |
commit | b35a4b34ddc0fde9d0fd5e6c0105dff2102d8236 (patch) | |
tree | f5488520fce19975b3b70d00050894a5fb484efa /meta/recipes-multimedia/libogg | |
parent | 0d44dbdaa8d9028094aa7ee77bf8595a5a9e6f75 (diff) | |
download | poky-b35a4b34ddc0fde9d0fd5e6c0105dff2102d8236.tar.gz |
libtiff: Security Advisory - libtiff - CVE-2017-5225
Libtiff is vulnerable to a heap buffer overflow in the tools/tiffcp
resulting in DoS or code execution via a crafted BitsPerSample value.
Porting patch from <https://github.com/vadz/libtiff/commit/
5c080298d59efa53264d7248bbe3a04660db6ef7> to solve CVE-2017-5225.
(From OE-Core rev: 434990304bdfb70441b399ff8998dbe3fe1b1e1f)
(From OE-Core rev: d26ea3b9b698fcb059aaa34c2408e3b95ca4f31d)
Signed-off-by: Li Zhou <li.zhou@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-multimedia/libogg')
0 files changed, 0 insertions, 0 deletions