diff options
author | Baogen Shang <baogen.shang@windriver.com> | 2013-10-21 11:00:05 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2013-12-12 16:56:38 +0000 |
commit | 60482e45677c467f55950ce0f825d6cb9c121c9c (patch) | |
tree | 5f7c029b0dd7738e6052154569ae7374c252862a /meta/lib/oeqa/runtime/ldd.py | |
parent | 06c566596a92a309ca228a209f14d03b69a611c9 (diff) | |
download | openembedded-core-60482e45677c467f55950ce0f825d6cb9c121c9c.tar.gz openembedded-core-60482e45677c467f55950ce0f825d6cb9c121c9c.tar.bz2 openembedded-core-60482e45677c467f55950ce0f825d6cb9c121c9c.zip |
libtiff: CVE-2013-4232
cve description:
Use-after-free vulnerability in the t2p_readwrite_pdf_image function
in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause
a denial of service (crash) or possible execute arbitrary code via a
crafted TIFF image.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4232
Signed-off-by: Baogen Shang <baogen.shang@windriver.com>
Signed-off-by: Mark Hatle <mark.hatle@windriver.com>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
Diffstat (limited to 'meta/lib/oeqa/runtime/ldd.py')
0 files changed, 0 insertions, 0 deletions