]> code.ossystems Code Review - openembedded-core.git/commit
libtiff: Security Advisory - CVE-2012-4564
authorYue Tao <Yue.Tao@windriver.com>
Tue, 17 Jun 2014 08:25:20 +0000 (04:25 -0400)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Fri, 10 Oct 2014 14:05:51 +0000 (15:05 +0100)
commitff60c490c4fdb9f89d2b8e8fe7f2e7c4f2ff631f
treead408eb7afbd3e7cb650524f1b8e734a745388e5
parent14273b42542151357e3299736f2b730ca3257fc0
libtiff: Security Advisory - CVE-2012-4564

v2 changes:
* update format for commit log
* add Upstream-Status for patch

ppm2tiff does not check the return value of the TIFFScanlineSize
function, which allows remote attackers to cause a denial of service
(crash) and possibly execute arbitrary code via a crafted PPM image that
triggers an integer overflow, a zero-memory allocation, and a heap-based
buffer overflow.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4564

(From OE-Core rev: 9f02922d44de483ef4d02ce95b55efe79a8b09a2)

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-multimedia/libtiff/files/tiff-CVE-2012-4564.patch [new file with mode: 0644]
meta/recipes-multimedia/libtiff/tiff_4.0.3.bb