summaryrefslogtreecommitdiffstats
path: root/meta/recipes-support/vim/vim.inc
diff options
context:
space:
mode:
authorYogita Urade <yogita.urade@windriver.com>2025-09-30 13:49:25 +0530
committerSteve Sakoman <steve@sakoman.com>2025-10-03 09:51:17 -0700
commit15dd68bda1a70ce8b95e442f794951bfe3a54b3a (patch)
tree9091c4ae9f8ae40a8dd60cd7afc50e008e421f91 /meta/recipes-support/vim/vim.inc
parent9c9c70625270baeb44b75d4f12b266758eb9cd38 (diff)
downloadpoky-15dd68bda1a70ce8b95e442f794951bfe3a54b3a.tar.gz
tiff: fix CVE-2025-9900
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file.[EOL][EOL]By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user. Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-9900 Upstream patch: https://gitlab.com/libtiff/libtiff/-/commit/3e0dcf0ec651638b2bd849b2e6f3124b36890d99 (From OE-Core rev: f4e5cdeccee02d3ea78db91d5dfdcfd017c40ee0) Signed-off-by: Yogita Urade <yogita.urade@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/recipes-support/vim/vim.inc')
0 files changed, 0 insertions, 0 deletions