From 050629cd64f71e85b90392a857824544e8a8926a Mon Sep 17 00:00:00 2001 From: Li Zhou Date: Tue, 18 Aug 2015 11:45:41 +0800 Subject: gdk-pixbuf: Security Advisory - gdk-pixbuf - CVE-2015-4491 pixops: Be more careful about integer overflow Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling. (From OE-Core rev: e27f367d08becce9486f2890cb7382f3c8448246) Signed-off-by: Li Zhou Signed-off-by: Ross Burton Signed-off-by: Richard Purdie --- meta/recipes-gnome/gdk-pixbuf/gdk-pixbuf_2.30.8.bb | 1 + 1 file changed, 1 insertion(+) (limited to 'meta/recipes-gnome/gdk-pixbuf/gdk-pixbuf_2.30.8.bb') diff --git a/meta/recipes-gnome/gdk-pixbuf/gdk-pixbuf_2.30.8.bb b/meta/recipes-gnome/gdk-pixbuf/gdk-pixbuf_2.30.8.bb index a63d4546f6..07c2dcec16 100644 --- a/meta/recipes-gnome/gdk-pixbuf/gdk-pixbuf_2.30.8.bb +++ b/meta/recipes-gnome/gdk-pixbuf/gdk-pixbuf_2.30.8.bb @@ -18,6 +18,7 @@ SRC_URI = "${GNOME_MIRROR}/${BPN}/${MAJ_VER}/${BPN}-${PV}.tar.xz \ file://extending-libinstall-dependencies.patch \ file://run-ptest \ file://fatal-loader.patch \ + file://0001-pixops-Be-more-careful-about-integer-overflow.patch \ " SRC_URI[md5sum] = "4fed0d54432f1b69fc6e66e608bd5542" -- cgit v1.2.3-54-g00ecf