diff options
author | Sinan Kaya <okaya@kernel.org> | 2018-09-22 02:16:49 +0000 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2018-09-27 12:17:46 +0100 |
commit | b77082e38f8d6b94001df83d66fbfef0dad970cd (patch) | |
tree | 17f400533edfec8f2fd023477bc3f0cc92655b21 /meta/recipes-multimedia/libpng/libpng_1.6.34.bb | |
parent | d39e43f17fe76e15dc84adfd225ee80c75e2df7d (diff) | |
download | poky-b77082e38f8d6b94001df83d66fbfef0dad970cd.tar.gz |
libpng: CVE-2018-13785
* CVE-2018-13785
In libpng 1.6.34, a wrong calculation of row_factor in the
png_check_chunk_length function (pngrutil.c) may trigger an
integer overflow and resultant divide-by-zero while processing
a crafted PNG file, leading to a denial of service.
(cherry picked from 8a05766cb74af05c04c53e6c9d60c13fc4d59bf2)
Affects libpng <= 1.6.34
CVE: CVE-2018-13785
Ref: https://access.redhat.com/security/cve/cve-2018-13785
(From OE-Core rev: 4cc1862695c6899b61e3900216376c1b2f338a19)
Signed-off-by: Sinan Kaya <okaya@kernel.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-multimedia/libpng/libpng_1.6.34.bb')
-rw-r--r-- | meta/recipes-multimedia/libpng/libpng_1.6.34.bb | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/meta/recipes-multimedia/libpng/libpng_1.6.34.bb b/meta/recipes-multimedia/libpng/libpng_1.6.34.bb index e52d032289..3877d6cbf0 100644 --- a/meta/recipes-multimedia/libpng/libpng_1.6.34.bb +++ b/meta/recipes-multimedia/libpng/libpng_1.6.34.bb | |||
@@ -8,7 +8,9 @@ DEPENDS = "zlib" | |||
8 | 8 | ||
9 | LIBV = "16" | 9 | LIBV = "16" |
10 | 10 | ||
11 | SRC_URI = "${SOURCEFORGE_MIRROR}/project/${BPN}/${BPN}${LIBV}/${PV}/${BP}.tar.xz" | 11 | SRC_URI = "${SOURCEFORGE_MIRROR}/project/${BPN}/${BPN}${LIBV}/${PV}/${BP}.tar.xz \ |
12 | file://CVE-2018-13785.patch \ | ||
13 | " | ||
12 | SRC_URI[md5sum] = "c05b6ca7190a5e387b78657dbe5536b2" | 14 | SRC_URI[md5sum] = "c05b6ca7190a5e387b78657dbe5536b2" |
13 | SRC_URI[sha256sum] = "2f1e960d92ce3b3abd03d06dfec9637dfbd22febf107a536b44f7a47c60659f6" | 15 | SRC_URI[sha256sum] = "2f1e960d92ce3b3abd03d06dfec9637dfbd22febf107a536b44f7a47c60659f6" |
14 | 16 | ||