diff options
author | Yue Tao <Yue.Tao@windriver.com> | 2014-05-19 14:32:13 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2014-05-21 09:09:01 +0100 |
commit | 7719f580b61ba36c0449eddb28aff06e61cd5122 (patch) | |
tree | a32eff58fe69743d795bef2bc95299439bad4e42 /meta/recipes-multimedia | |
parent | 058ce93c7ed71de6703c23a3bfd05b954a821be7 (diff) | |
download | poky-7719f580b61ba36c0449eddb28aff06e61cd5122.tar.gz |
tiff: fix for Security Advisory CVE-2013-4231
Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers
to cause a denial of service (out-of-bounds write) via a crafted (1)
extension block in a GIF image or (2) GIF raster image to
tools/gif2tiff.c or (3) a long filename for a TIFF image to
tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which
states that the input cannot exceed the allocated buffer size.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4231Multiple
buffer overflows in libtiff before 4.0.3 allow remote attackers to cause
a denial of service (out-of-bounds write) via a crafted (1) extension
block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3)
a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1
and 3 are disputed by Red Hat, which states that the input cannot exceed
the allocated buffer size.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4231
(From OE-Core rev: 19e6d05161ef9f4e5f7277f6eb35eb5d94ecf629)
Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Roy Li <rongqing.li@windriver.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-multimedia')
-rw-r--r-- | meta/recipes-multimedia/libtiff/files/libtiff-CVE-2013-4231.patch | 44 | ||||
-rw-r--r-- | meta/recipes-multimedia/libtiff/tiff_4.0.3.bb | 3 |
2 files changed, 46 insertions, 1 deletions
diff --git a/meta/recipes-multimedia/libtiff/files/libtiff-CVE-2013-4231.patch b/meta/recipes-multimedia/libtiff/files/libtiff-CVE-2013-4231.patch new file mode 100644 index 0000000000..d8d4e961db --- /dev/null +++ b/meta/recipes-multimedia/libtiff/files/libtiff-CVE-2013-4231.patch | |||
@@ -0,0 +1,44 @@ | |||
1 | Upstream-Status: Backport | ||
2 | |||
3 | Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers | ||
4 | to cause a denial of service (out-of-bounds write) via a crafted (1) | ||
5 | extension block in a GIF image or (2) GIF raster image to | ||
6 | tools/gif2tiff.c or (3) a long filename for a TIFF image to | ||
7 | tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which | ||
8 | states that the input cannot exceed the allocated buffer size. | ||
9 | |||
10 | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4231Multiple | ||
11 | buffer overflows in libtiff before 4.0.3 allow remote attackers to cause | ||
12 | a denial of service (out-of-bounds write) via a crafted (1) extension | ||
13 | block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) | ||
14 | a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 | ||
15 | and 3 are disputed by Red Hat, which states that the input cannot exceed | ||
16 | the allocated buffer size. | ||
17 | |||
18 | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4231 | ||
19 | |||
20 | Signed-off-by: Yue Tao <Yue.Tao@windriver.com> | ||
21 | |||
22 | Index: tools/gif2tiff.c | ||
23 | =================================================================== | ||
24 | RCS file: /cvs/maptools/cvsroot/libtiff/tools/gif2tiff.c,v | ||
25 | retrieving revision 1.12 | ||
26 | retrieving revision 1.13 | ||
27 | diff -u -r1.12 -r1.13 | ||
28 | --- a/tools/gif2tiff.c 15 Dec 2010 00:22:44 -0000 1.12 | ||
29 | +++ b/tools/gif2tiff.c 14 Aug 2013 05:18:53 -0000 1.13 | ||
30 | @@ -1,4 +1,4 @@ | ||
31 | -/* $Id: gif2tiff.c,v 1.12 2010-12-15 00:22:44 faxguy Exp $ */ | ||
32 | +/* $Id: gif2tiff.c,v 1.13 2013-08-14 05:18:53 fwarmerdam Exp $ */ | ||
33 | |||
34 | /* | ||
35 | * Copyright (c) 1990-1997 Sam Leffler | ||
36 | @@ -333,6 +333,8 @@ | ||
37 | int status = 1; | ||
38 | |||
39 | datasize = getc(infile); | ||
40 | + if (datasize > 12) | ||
41 | + return 0; | ||
42 | clear = 1 << datasize; | ||
43 | eoi = clear + 1; | ||
44 | avail = clear + 2; | ||
diff --git a/meta/recipes-multimedia/libtiff/tiff_4.0.3.bb b/meta/recipes-multimedia/libtiff/tiff_4.0.3.bb index fb9e0bf67d..6483655ccc 100644 --- a/meta/recipes-multimedia/libtiff/tiff_4.0.3.bb +++ b/meta/recipes-multimedia/libtiff/tiff_4.0.3.bb | |||
@@ -8,7 +8,8 @@ SRC_URI = "ftp://ftp.remotesensing.org/pub/libtiff/tiff-${PV}.tar.gz \ | |||
8 | file://libtiff-CVE-2013-1960.patch \ | 8 | file://libtiff-CVE-2013-1960.patch \ |
9 | file://libtiff-CVE-2013-4232.patch \ | 9 | file://libtiff-CVE-2013-4232.patch \ |
10 | file://libtiff-CVE-2013-4243.patch \ | 10 | file://libtiff-CVE-2013-4243.patch \ |
11 | file://libtiff-CVE-2013-4244.patch" | 11 | file://libtiff-CVE-2013-4244.patch \ |
12 | file://libtiff-CVE-2013-4231.patch " | ||
12 | 13 | ||
13 | SRC_URI[md5sum] = "051c1068e6a0627f461948c365290410" | 14 | SRC_URI[md5sum] = "051c1068e6a0627f461948c365290410" |
14 | SRC_URI[sha256sum] = "ea1aebe282319537fb2d4d7805f478dd4e0e05c33d0928baba76a7c963684872" | 15 | SRC_URI[sha256sum] = "ea1aebe282319537fb2d4d7805f478dd4e0e05c33d0928baba76a7c963684872" |