]> code.ossystems Code Review - openembedded-core.git/commit
tiff: Security fix CVE-2016-3623
authorYi Zhao <yi.zhao@windriver.com>
Wed, 26 Oct 2016 08:26:47 +0000 (16:26 +0800)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Thu, 18 May 2017 12:13:37 +0000 (13:13 +0100)
commit4cb329454fec849ca0ea6106d78d1240c760bd11
tree99d9adbd2e890cd59bc344d5b8dde416e1672d7a
parenta0115f89df6c082949796a75551ea43b35c39ccd
tiff: Security fix CVE-2016-3623

CVE-2016-3623 libtiff: The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier
allows remote attackers to cause a denial of service (divide-by-zero) by
setting the (1) v or (2) h parameter to 0.

External References:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3623
http://bugzilla.maptools.org/show_bug.cgi?id=2569

Patch from:
https://github.com/vadz/libtiff/commit/bd024f07019f5d9fea236675607a69f74a66bc7b

(From OE-Core rev: d66824eee47b7513b919ea04bdf41dc48a9d85e9)

(From OE-Core rev: f0e77ffa6bbc3adc61a2abd5dbc9228e830c055d)

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-multimedia/libtiff/files/CVE-2016-3623.patch [new file with mode: 0644]
meta/recipes-multimedia/libtiff/tiff_4.0.6.bb