summaryrefslogtreecommitdiffstats
path: root/meta/recipes-multimedia/libtiff
diff options
context:
space:
mode:
authorYue Tao <Yue.Tao@windriver.com>2014-05-19 14:32:13 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2014-05-21 09:09:01 +0100
commit7719f580b61ba36c0449eddb28aff06e61cd5122 (patch)
treea32eff58fe69743d795bef2bc95299439bad4e42 /meta/recipes-multimedia/libtiff
parent058ce93c7ed71de6703c23a3bfd05b954a821be7 (diff)
downloadpoky-7719f580b61ba36c0449eddb28aff06e61cd5122.tar.gz
tiff: fix for Security Advisory CVE-2013-4231
Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4231Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4231 (From OE-Core rev: 19e6d05161ef9f4e5f7277f6eb35eb5d94ecf629) Signed-off-by: Yue Tao <Yue.Tao@windriver.com> Signed-off-by: Roy Li <rongqing.li@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-multimedia/libtiff')
-rw-r--r--meta/recipes-multimedia/libtiff/files/libtiff-CVE-2013-4231.patch44
-rw-r--r--meta/recipes-multimedia/libtiff/tiff_4.0.3.bb3
2 files changed, 46 insertions, 1 deletions
diff --git a/meta/recipes-multimedia/libtiff/files/libtiff-CVE-2013-4231.patch b/meta/recipes-multimedia/libtiff/files/libtiff-CVE-2013-4231.patch
new file mode 100644
index 0000000000..d8d4e961db
--- /dev/null
+++ b/meta/recipes-multimedia/libtiff/files/libtiff-CVE-2013-4231.patch
@@ -0,0 +1,44 @@
1Upstream-Status: Backport
2
3Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers
4to cause a denial of service (out-of-bounds write) via a crafted (1)
5extension block in a GIF image or (2) GIF raster image to
6tools/gif2tiff.c or (3) a long filename for a TIFF image to
7tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which
8states that the input cannot exceed the allocated buffer size.
9
10http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4231Multiple
11buffer overflows in libtiff before 4.0.3 allow remote attackers to cause
12a denial of service (out-of-bounds write) via a crafted (1) extension
13block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3)
14a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1
15and 3 are disputed by Red Hat, which states that the input cannot exceed
16the allocated buffer size.
17
18http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4231
19
20Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
21
22Index: tools/gif2tiff.c
23===================================================================
24RCS file: /cvs/maptools/cvsroot/libtiff/tools/gif2tiff.c,v
25retrieving revision 1.12
26retrieving revision 1.13
27diff -u -r1.12 -r1.13
28--- a/tools/gif2tiff.c 15 Dec 2010 00:22:44 -0000 1.12
29+++ b/tools/gif2tiff.c 14 Aug 2013 05:18:53 -0000 1.13
30@@ -1,4 +1,4 @@
31-/* $Id: gif2tiff.c,v 1.12 2010-12-15 00:22:44 faxguy Exp $ */
32+/* $Id: gif2tiff.c,v 1.13 2013-08-14 05:18:53 fwarmerdam Exp $ */
33
34 /*
35 * Copyright (c) 1990-1997 Sam Leffler
36@@ -333,6 +333,8 @@
37 int status = 1;
38
39 datasize = getc(infile);
40+ if (datasize > 12)
41+ return 0;
42 clear = 1 << datasize;
43 eoi = clear + 1;
44 avail = clear + 2;
diff --git a/meta/recipes-multimedia/libtiff/tiff_4.0.3.bb b/meta/recipes-multimedia/libtiff/tiff_4.0.3.bb
index fb9e0bf67d..6483655ccc 100644
--- a/meta/recipes-multimedia/libtiff/tiff_4.0.3.bb
+++ b/meta/recipes-multimedia/libtiff/tiff_4.0.3.bb
@@ -8,7 +8,8 @@ SRC_URI = "ftp://ftp.remotesensing.org/pub/libtiff/tiff-${PV}.tar.gz \
8 file://libtiff-CVE-2013-1960.patch \ 8 file://libtiff-CVE-2013-1960.patch \
9 file://libtiff-CVE-2013-4232.patch \ 9 file://libtiff-CVE-2013-4232.patch \
10 file://libtiff-CVE-2013-4243.patch \ 10 file://libtiff-CVE-2013-4243.patch \
11 file://libtiff-CVE-2013-4244.patch" 11 file://libtiff-CVE-2013-4244.patch \
12 file://libtiff-CVE-2013-4231.patch "
12 13
13SRC_URI[md5sum] = "051c1068e6a0627f461948c365290410" 14SRC_URI[md5sum] = "051c1068e6a0627f461948c365290410"
14SRC_URI[sha256sum] = "ea1aebe282319537fb2d4d7805f478dd4e0e05c33d0928baba76a7c963684872" 15SRC_URI[sha256sum] = "ea1aebe282319537fb2d4d7805f478dd4e0e05c33d0928baba76a7c963684872"