diff options
author | Yi Zhao <yi.zhao@windriver.com> | 2017-08-22 08:58:35 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2017-11-21 14:43:53 +0000 |
commit | 9b6e00b7d719cca31db3ecfdbd6bfbfecc09db65 (patch) | |
tree | 561eeb0e46643377e6988df254a43ce4335fbb9a /meta/recipes-multimedia/libtiff/files/CVE-2017-10688.patch | |
parent | b35a4b34ddc0fde9d0fd5e6c0105dff2102d8236 (diff) | |
download | poky-9b6e00b7d719cca31db3ecfdbd6bfbfecc09db65.tar.gz |
tiff: Security fixes
Fix CVE-2017-9147, CVE-2017-9936, CVE-2017-10668, CVE-2017-11335
References:
https://nvd.nist.gov/vuln/detail/CVE-2017-9147
https://nvd.nist.gov/vuln/detail/CVE-2017-9936
https://nvd.nist.gov/vuln/detail/CVE-2017-10668
https://nvd.nist.gov/vuln/detail/CVE-2017-11335
Patches from:
CVE-2017-9147:
https://github.com/vadz/libtiff/commit/4d4fa0b68ae9ae038959ee4f69ebe288ec892f06
CVE-2017-9936:
https://github.com/vadz/libtiff/commit/fe8d7165956b88df4837034a9161dc5fd20cf67a
CVE-2017-10688:
https://github.com/vadz/libtiff/commit/6173a57d39e04d68b139f8c1aa499a24dbe74ba1
CVE-2017-11355:
https://github.com/vadz/libtiff/commit/69bfeec247899776b1b396651adb47436e5f1556
(From OE-Core rev: 5c89539edb17d01ffe82a1b2e7d092816003ecf3)
(From OE-Core rev: eaf72d105bed54e332e2e5c0c5c0a0087ecd91dd)
(From OE-Core rev: dc7573cd330d1fc2e4bd50c1ba171906e1d5d5c0)
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
minor fixes to get to apply
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-multimedia/libtiff/files/CVE-2017-10688.patch')
-rw-r--r-- | meta/recipes-multimedia/libtiff/files/CVE-2017-10688.patch | 88 |
1 files changed, 88 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/libtiff/files/CVE-2017-10688.patch b/meta/recipes-multimedia/libtiff/files/CVE-2017-10688.patch new file mode 100644 index 0000000000..ed9c0f50f9 --- /dev/null +++ b/meta/recipes-multimedia/libtiff/files/CVE-2017-10688.patch | |||
@@ -0,0 +1,88 @@ | |||
1 | From 333ba5599e87bd7747516d7863d61764e4ca2d92 Mon Sep 17 00:00:00 2001 | ||
2 | From: Even Rouault <even.rouault@spatialys.com> | ||
3 | Date: Fri, 30 Jun 2017 17:29:44 +0000 | ||
4 | Subject: [PATCH] * libtiff/tif_dirwrite.c: in | ||
5 | TIFFWriteDirectoryTagCheckedXXXX() functions associated with LONG8/SLONG8 | ||
6 | data type, replace assertion that the file is BigTIFF, by a non-fatal error. | ||
7 | Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2712 Reported by team | ||
8 | OWL337 | ||
9 | |||
10 | Upstream-Status: Backport | ||
11 | [https://github.com/vadz/libtiff/commit/6173a57d39e04d68b139f8c1aa499a24dbe74ba1] | ||
12 | |||
13 | CVE: CVE-2017-10688 | ||
14 | |||
15 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
16 | --- | ||
17 | ChangeLog | 8 ++++++++ | ||
18 | libtiff/tif_dirwrite.c | 20 ++++++++++++++++---- | ||
19 | 2 files changed, 24 insertions(+), 4 deletions(-) | ||
20 | |||
21 | Index: tiff-4.0.7/ChangeLog | ||
22 | =================================================================== | ||
23 | --- tiff-4.0.7.orig/ChangeLog | ||
24 | +++ tiff-4.0.7/ChangeLog | ||
25 | @@ -1,3 +1,11 @@ | ||
26 | +2017-06-30 Even Rouault <even.rouault at spatialys.com> | ||
27 | + | ||
28 | + * libtiff/tif_dirwrite.c: in TIFFWriteDirectoryTagCheckedXXXX() | ||
29 | + functions associated with LONG8/SLONG8 data type, replace assertion that | ||
30 | + the file is BigTIFF, by a non-fatal error. | ||
31 | + Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2712 | ||
32 | + Reported by team OWL337 | ||
33 | + | ||
34 | 2017-06-26 Even Rouault <even.rouault at spatialys.com> | ||
35 | |||
36 | * libtiff/tif_jbig.c: fix memory leak in error code path of JBIGDecode() | ||
37 | Index: tiff-4.0.7/libtiff/tif_dirwrite.c | ||
38 | =================================================================== | ||
39 | --- tiff-4.0.7.orig/libtiff/tif_dirwrite.c | ||
40 | +++ tiff-4.0.7/libtiff/tif_dirwrite.c | ||
41 | @@ -2047,7 +2047,10 @@ TIFFWriteDirectoryTagCheckedLong8(TIFF* | ||
42 | { | ||
43 | uint64 m; | ||
44 | assert(sizeof(uint64)==8); | ||
45 | - assert(tif->tif_flags&TIFF_BIGTIFF); | ||
46 | + if( !(tif->tif_flags&TIFF_BIGTIFF) ) { | ||
47 | + TIFFErrorExt(tif->tif_clientdata,"TIFFWriteDirectoryTagCheckedLong8","LONG8 not allowed for ClassicTIFF"); | ||
48 | + return(0); | ||
49 | + } | ||
50 | m=value; | ||
51 | if (tif->tif_flags&TIFF_SWAB) | ||
52 | TIFFSwabLong8(&m); | ||
53 | @@ -2060,7 +2063,10 @@ TIFFWriteDirectoryTagCheckedLong8Array(T | ||
54 | { | ||
55 | assert(count<0x20000000); | ||
56 | assert(sizeof(uint64)==8); | ||
57 | - assert(tif->tif_flags&TIFF_BIGTIFF); | ||
58 | + if( !(tif->tif_flags&TIFF_BIGTIFF) ) { | ||
59 | + TIFFErrorExt(tif->tif_clientdata,"TIFFWriteDirectoryTagCheckedLong8","LONG8 not allowed for ClassicTIFF"); | ||
60 | + return(0); | ||
61 | + } | ||
62 | if (tif->tif_flags&TIFF_SWAB) | ||
63 | TIFFSwabArrayOfLong8(value,count); | ||
64 | return(TIFFWriteDirectoryTagData(tif,ndir,dir,tag,TIFF_LONG8,count,count*8,value)); | ||
65 | @@ -2072,7 +2078,10 @@ TIFFWriteDirectoryTagCheckedSlong8(TIFF* | ||
66 | { | ||
67 | int64 m; | ||
68 | assert(sizeof(int64)==8); | ||
69 | - assert(tif->tif_flags&TIFF_BIGTIFF); | ||
70 | + if( !(tif->tif_flags&TIFF_BIGTIFF) ) { | ||
71 | + TIFFErrorExt(tif->tif_clientdata,"TIFFWriteDirectoryTagCheckedLong8","SLONG8 not allowed for ClassicTIFF"); | ||
72 | + return(0); | ||
73 | + } | ||
74 | m=value; | ||
75 | if (tif->tif_flags&TIFF_SWAB) | ||
76 | TIFFSwabLong8((uint64*)(&m)); | ||
77 | @@ -2085,7 +2094,10 @@ TIFFWriteDirectoryTagCheckedSlong8Array( | ||
78 | { | ||
79 | assert(count<0x20000000); | ||
80 | assert(sizeof(int64)==8); | ||
81 | - assert(tif->tif_flags&TIFF_BIGTIFF); | ||
82 | + if( !(tif->tif_flags&TIFF_BIGTIFF) ) { | ||
83 | + TIFFErrorExt(tif->tif_clientdata,"TIFFWriteDirectoryTagCheckedLong8","SLONG8 not allowed for ClassicTIFF"); | ||
84 | + return(0); | ||
85 | + } | ||
86 | if (tif->tif_flags&TIFF_SWAB) | ||
87 | TIFFSwabArrayOfLong8((uint64*)value,count); | ||
88 | return(TIFFWriteDirectoryTagData(tif,ndir,dir,tag,TIFF_SLONG8,count,count*8,value)); | ||