diff options
author | Yi Zhao <yi.zhao@windriver.com> | 2016-10-26 16:26:47 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-11-06 23:35:16 +0000 |
commit | d66824eee47b7513b919ea04bdf41dc48a9d85e9 (patch) | |
tree | e13c76dadacbb80acf50e9b388590a1858f5ea11 /meta/recipes-multimedia/libomxil | |
parent | d31267438a654ecb396aefced201f52164171055 (diff) | |
download | openembedded-core-d66824eee47b7513b919ea04bdf41dc48a9d85e9.tar.gz openembedded-core-d66824eee47b7513b919ea04bdf41dc48a9d85e9.tar.bz2 openembedded-core-d66824eee47b7513b919ea04bdf41dc48a9d85e9.zip |
tiff: Security fix CVE-2016-3623
CVE-2016-3623 libtiff: The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier
allows remote attackers to cause a denial of service (divide-by-zero) by
setting the (1) v or (2) h parameter to 0.
External References:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3623
http://bugzilla.maptools.org/show_bug.cgi?id=2569
Patch from:
https://github.com/vadz/libtiff/commit/bd024f07019f5d9fea236675607a69f74a66bc7b
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Diffstat (limited to 'meta/recipes-multimedia/libomxil')
0 files changed, 0 insertions, 0 deletions