]> code.ossystems Code Review - openembedded-core.git/commit
tiff: Security fix CVE-2016-3623
authorYi Zhao <yi.zhao@windriver.com>
Wed, 26 Oct 2016 08:26:47 +0000 (16:26 +0800)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Wed, 16 Nov 2016 10:33:34 +0000 (10:33 +0000)
commitf0e77ffa6bbc3adc61a2abd5dbc9228e830c055d
tree87b119ef03ac96479c8900f85252b03680651618
parentcf58711f12425fc1c29ed1e3bf3919b3452aa2b2
tiff: Security fix CVE-2016-3623

CVE-2016-3623 libtiff: The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier
allows remote attackers to cause a denial of service (divide-by-zero) by
setting the (1) v or (2) h parameter to 0.

External References:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3623
http://bugzilla.maptools.org/show_bug.cgi?id=2569

Patch from:
https://github.com/vadz/libtiff/commit/bd024f07019f5d9fea236675607a69f74a66bc7b

(From OE-Core rev: d66824eee47b7513b919ea04bdf41dc48a9d85e9)

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
meta/recipes-multimedia/libtiff/files/CVE-2016-3623.patch [new file with mode: 0644]
meta/recipes-multimedia/libtiff/tiff_4.0.6.bb