diff options
author | Yogita Urade <yogita.urade@windriver.com> | 2023-09-15 07:34:49 +0000 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2023-10-18 05:25:19 -1000 |
commit | d06bb8d657159cb42247719e28c97f3d2c02bb6c (patch) | |
tree | 2363a3f8295f15cba26d6e6a1dcdd59e69faaaa6 /meta/classes/cve-check.bbclass | |
parent | 912aaf2a8740f4b5d7cd95c404ea4d6dfc07d407 (diff) | |
download | poky-d06bb8d657159cb42247719e28c97f3d2c02bb6c.tar.gz |
tiff: fix CVE-2023-41175
libtiff: potential integer overflow in raw2tiff.c
References:
https://bugzilla.redhat.com/show_bug.cgi?id=2235264
https://security-tracker.debian.org/tracker/CVE-2023-41175
https://gitlab.com/libtiff/libtiff/-/issues/592
(From OE-Core rev: b2518923dff885778c550f0faa22e99bf76b6288)
Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 4ee806cbc12fbc830b09ba6222e96b1e5f24539f)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/classes/cve-check.bbclass')
0 files changed, 0 insertions, 0 deletions