]> code.ossystems Code Review - openembedded-core.git/commit
tiff: Security fix CVE-2016-5323
authorYi Zhao <yi.zhao@windriver.com>
Wed, 10 Aug 2016 07:11:20 +0000 (15:11 +0800)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Fri, 23 Sep 2016 14:25:56 +0000 (15:25 +0100)
commite066ba81ac7aecd3d9dfa1cb5d89acb6dc073e8f
tree6aa8e41a1a57611954c7998d564d6f977b611e85
parentff5d0abf31394d332c5db06a2d3ef337b1f8db9d
tiff: Security fix CVE-2016-5323

CVE-2016-5323 libtiff: a maliciously crafted TIFF file could cause the
application to crash when using tiffcrop command

External References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5323
http://bugzilla.maptools.org/show_bug.cgi?id=2559

Patch from:
https://github.com/vadz/libtiff/commit/2f79856097f423eb33796a15fcf700d2ea41bf31

(From OE-Core rev: 4ad1220e0a7f9ca9096860f4f9ae7017b36e29e4)

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
meta/recipes-multimedia/libtiff/files/CVE-2016-5323.patch [new file with mode: 0644]
meta/recipes-multimedia/libtiff/tiff_4.0.6.bb