diff options
| author | Yogita Urade <yogita.urade@windriver.com> | 2025-10-17 14:04:07 +0530 |
|---|---|---|
| committer | Anuj Mittal <anuj.mittal@intel.com> | 2025-10-30 14:43:36 +0800 |
| commit | 580609b6d5f3bca9ae3d3e88bb1b98afd5b282a6 (patch) | |
| tree | 2598d2650057889993d62091f39084884c5d5cd1 /meta-python/recipes-devtools/python-jsonref/python-jsonref.inc | |
| parent | ed71c716fa13d131a821791cf769d7b0336465cd (diff) | |
| download | meta-openembedded-580609b6d5f3bca9ae3d3e88bb1b98afd5b282a6.tar.gz | |
poppler: fix CVE-2025-52885
Poppler ia a library for rendering PDF files, and examining or
modifying their structure. A use-after-free (write) vulnerability
has been detected in versions Poppler prior to 25.10.0 within the
StructTreeRoot class. The issue arises from the use of raw pointers
to elements of a `std::vector`, which can lead to dangling pointers
when the vector is resized. The vulnerability stems from the way that
refToParentMap stores references to `std::vector` elements using raw
pointers. These pointers may become invalid when the vector is resized.
This vulnerability is a common security problem involving the use of
raw pointers to `std::vectors`. Internally, `std::vector `stores its
elements in a dynamically allocated array. When the array reaches its
capacity and a new element is added, the vector reallocates a larger
block of memory and moves all the existing elements to the new location.
At this point if any pointers to elements are stored before a resize
occurs, they become dangling pointers once the reallocation happens.
Version 25.10.0 contains a patch for the issue.
Reference:
https://nvd.nist.gov/vuln/detail/CVE-2025-52885
Upstream patch:
https://gitlab.freedesktop.org/poppler/poppler/-/commit/4ce27cc826bf90cc8dbbd8a8c87bd913cccd7ec0
Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Diffstat (limited to 'meta-python/recipes-devtools/python-jsonref/python-jsonref.inc')
0 files changed, 0 insertions, 0 deletions
