summaryrefslogtreecommitdiffstats
path: root/scripts/lib/devtool/build-image.py
diff options
context:
space:
mode:
authorYogita Urade <yogita.urade@windriver.com>2025-09-30 13:47:48 +0530
committerSteve Sakoman <steve@sakoman.com>2025-10-09 12:16:45 -0700
commit2ce56bd707939989cffa77944943e76cbe502d87 (patch)
tree1a4967c8c3669cc71122fa521cd31e96057182d7 /scripts/lib/devtool/build-image.py
parenteae801c832ab1a8d5ef970c58db9dc1fea47fa3b (diff)
downloadpoky-2ce56bd707939989cffa77944943e76cbe502d87.tar.gz
tiff: fix CVE-2025-9900
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file.[EOL][EOL]By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user. Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-9900 Upstream patch: https://gitlab.com/libtiff/libtiff/-/commit/3e0dcf0ec651638b2bd849b2e6f3124b36890d99 (From OE-Core rev: c1303b8eb4e85a031a175867361876a256bfb763) Signed-off-by: Yogita Urade <yogita.urade@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'scripts/lib/devtool/build-image.py')
0 files changed, 0 insertions, 0 deletions