]> code.ossystems Code Review - openembedded-core.git/commit
libtiff: Security Advisory - CVE-2012-4564
authorYue Tao <Yue.Tao@windriver.com>
Tue, 17 Jun 2014 08:25:20 +0000 (04:25 -0400)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Tue, 17 Jun 2014 09:23:45 +0000 (10:23 +0100)
commit9f02922d44de483ef4d02ce95b55efe79a8b09a2
tree6124e52eb039e2388f945569e964e1c4d350f7af
parent69255c84ebd99629da8174e1e73fd8c715e49b52
libtiff: Security Advisory - CVE-2012-4564

v2 changes:
* update format for commit log
* add Upstream-Status for patch

ppm2tiff does not check the return value of the TIFFScanlineSize
function, which allows remote attackers to cause a denial of service
(crash) and possibly execute arbitrary code via a crafted PPM image that
triggers an integer overflow, a zero-memory allocation, and a heap-based
buffer overflow.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4564

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-multimedia/libtiff/files/tiff-CVE-2012-4564.patch [new file with mode: 0644]
meta/recipes-multimedia/libtiff/tiff_4.0.3.bb