]> code.ossystems Code Review - openembedded-core.git/commit
libtiff: CVE-2013-4232
authorBaogen Shang <baogen.shang@windriver.com>
Mon, 21 Oct 2013 03:00:05 +0000 (11:00 +0800)
committerPaul Eggleton <paul.eggleton@linux.intel.com>
Thu, 12 Dec 2013 17:24:47 +0000 (17:24 +0000)
commit96ae9c1b9a0baab55d00aaaafb1df8ca8c928314
treefde8f7df29e5a4d44fb4cb2dc5b8b93649b8e2a3
parent70f37e59b9d2c5e5ebb67283363acb02c76504a8
libtiff: CVE-2013-4232

cve description:
Use-after-free vulnerability in the t2p_readwrite_pdf_image function
in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause
a denial of service (crash) or possible execute arbitrary code via a
crafted TIFF image.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4232

(From OE-Core dora rev: 60482e45677c467f55950ce0f825d6cb9c121c9c)

Signed-off-by: Baogen Shang <baogen.shang@windriver.com>
Signed-off-by: Mark Hatle <mark.hatle@windriver.com>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-multimedia/libtiff/files/libtiff-CVE-2013-4232.patch [new file with mode: 0644]
meta/recipes-multimedia/libtiff/tiff_4.0.3.bb