summaryrefslogtreecommitdiffstats
path: root/documentation/sdk-manual/appendix-customizing.rst
diff options
context:
space:
mode:
authorHitendra Prajapati <hprajapati@mvista.com>2023-10-16 14:09:59 +0530
committerSteve Sakoman <steve@sakoman.com>2023-10-21 05:21:36 -1000
commit24e9fed15ad702f1f3ab447e3e647cede9ebdea4 (patch)
treef7c4fa18526863b4355cbdfe86c275a45349a183 /documentation/sdk-manual/appendix-customizing.rst
parentf550a6316167d86ca401fa8e22baf316b5548ffd (diff)
downloadpoky-24e9fed15ad702f1f3ab447e3e647cede9ebdea4.tar.gz
libtiff: Add fix for tiffcrop CVE-2023-1916
Add fix for tiffcrop tool CVE-2023-1916 [1]. A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x. The tool is no longer part of newer libtiff distributions, hence the fix is rejected by upstream in [2]. The backport is still applicable to older versions of libtiff, pick the CVE fix from ubuntu 20.04 [3]. [1] https://nvd.nist.gov/vuln/detail/CVE-2023-1916 [2] https://gitlab.com/libtiff/libtiff/-/merge_requests/535 [3] https://packages.ubuntu.com/source/focal-updates/tiff (From OE-Core rev: 4d3e7f9a157e56a4a8ffb4d16fd6401a22851307) Signed-off-by: Marek Vasut <marex@denx.de> Upstream-Status: Backport from https://gitlab.com/libtiff/libtiff/-/commit/848434a81c443f59ec90d41218eba6e48a450a11 && https://gitlab.com/libtiff/libtiff/-/merge_requests/535 Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'documentation/sdk-manual/appendix-customizing.rst')
0 files changed, 0 insertions, 0 deletions