]> code.ossystems Code Review - openembedded-core.git/commit
tiff: fix for Security Advisory CVE-2013-4231
authorYue Tao <Yue.Tao@windriver.com>
Mon, 19 May 2014 06:32:13 +0000 (14:32 +0800)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Wed, 21 May 2014 08:08:10 +0000 (09:08 +0100)
commit19e6d05161ef9f4e5f7277f6eb35eb5d94ecf629
tree09cc6a49ee6ba559d129db3bbd37a8d44350328d
parent11e728e64e37eec72ed0cb3fb4d5a49ddeb88666
tiff: fix for Security Advisory CVE-2013-4231

Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers
to cause a denial of service (out-of-bounds write) via a crafted (1)
extension block in a GIF image or (2) GIF raster image to
tools/gif2tiff.c or (3) a long filename for a TIFF image to
tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which
states that the input cannot exceed the allocated buffer size.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4231Multiple
buffer overflows in libtiff before 4.0.3 allow remote attackers to cause
a denial of service (out-of-bounds write) via a crafted (1) extension
block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3)
a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1
and 3 are disputed by Red Hat, which states that the input cannot exceed
the allocated buffer size.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4231

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Roy Li <rongqing.li@windriver.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
meta/recipes-multimedia/libtiff/files/libtiff-CVE-2013-4231.patch [new file with mode: 0644]
meta/recipes-multimedia/libtiff/tiff_4.0.3.bb