diff options
author | Catalin Enache <catalin.enache@windriver.com> | 2017-05-22 16:01:11 +0300 |
---|---|---|
committer | Martin Jansa <Martin.Jansa@gmail.com> | 2017-06-05 11:01:45 +0200 |
commit | 0ae067ae242747bd9484a07bf9760822e6badc36 (patch) | |
tree | 0b96af0c58fd4a6903ee54e5c15fa0ecc981d678 /meta-python/recipes-devtools/python/python-progress.inc | |
parent | 1fc882cdc477633207db0236619d8f447fad7563 (diff) | |
download | meta-openembedded-0ae067ae242747bd9484a07bf9760822e6badc36.tar.gz |
gd : CVE-2016-6906
The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd)
before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read)
via a crafted TGA file, related to the decompression buffer.
Reference:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6906
Upstream patches:
https://github.com/libgd/libgd/commit/fb0e0cce0b9f25389ab56604c3547351617e1415
https://github.com/libgd/libgd/commit/58b6dde319c301b0eae27d12e2a659e067d80558
Signed-off-by: Catalin Enache <catalin.enache@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python-progress.inc')
0 files changed, 0 insertions, 0 deletions