From 1b03beb80a977a0449b026b950347e453f8aa636 Mon Sep 17 00:00:00 2001 From: Yi Zhao Date: Wed, 10 Aug 2016 15:11:19 +0800 Subject: tiff: Security fix CVE-2016-5321 CVE-2016-5321 libtiff: a maliciously crafted TIFF file could cause the application to crash when using tiffcrop command External References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5321 http://bugzilla.maptools.org/show_bug.cgi?id=2558 Patch from: https://github.com/vadz/libtiff/commit/d9783e4a1476b6787a51c5ae9e9b3156527589f0 (From OE-Core rev: 4a167cfb6ad79bbe2a2ff7f7b43c4a162ca42a4d) Signed-off-by: Yi Zhao Signed-off-by: Ross Burton Signed-off-by: Richard Purdie --- meta/recipes-multimedia/libtiff/tiff_4.0.6.bb | 1 + 1 file changed, 1 insertion(+) (limited to 'meta/recipes-multimedia/libtiff/tiff_4.0.6.bb') diff --git a/meta/recipes-multimedia/libtiff/tiff_4.0.6.bb b/meta/recipes-multimedia/libtiff/tiff_4.0.6.bb index 36cb34ee0f..63df126627 100644 --- a/meta/recipes-multimedia/libtiff/tiff_4.0.6.bb +++ b/meta/recipes-multimedia/libtiff/tiff_4.0.6.bb @@ -9,6 +9,7 @@ SRC_URI = "ftp://ftp.remotesensing.org/pub/libtiff/tiff-${PV}.tar.gz \ file://CVE-2015-8781.patch \ file://CVE-2015-8784.patch \ file://CVE-2016-3186.patch \ + file://CVE-2016-5321.patch \ " SRC_URI[md5sum] = "d1d2e940dea0b5ad435f21f03d96dd72" -- cgit v1.2.3-54-g00ecf