diff options
| author | Gyorgy Sarvari <skandigraun@gmail.com> | 2025-11-28 21:18:45 +0100 |
|---|---|---|
| committer | Gyorgy Sarvari <skandigraun@gmail.com> | 2025-11-30 15:13:58 +0100 |
| commit | a12478e722795c2b585f9ef125bee16dbc95bd2f (patch) | |
| tree | f2ad85c4790a65a627cde69cc8a6005c788036dd | |
| parent | 0e30e2ab372c8ea77744e797541ac4971798f1a3 (diff) | |
| download | meta-openembedded-a12478e722795c2b585f9ef125bee16dbc95bd2f.tar.gz | |
libraw: patch CVE-2025-43964
Details: https://nvd.nist.gov/vuln/detail/CVE-2025-43964
Pick the patch that is referenced by the nvd report.
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
| -rw-r--r-- | meta-oe/recipes-support/libraw/libraw/CVE-2025-43964.patch | 25 | ||||
| -rw-r--r-- | meta-oe/recipes-support/libraw/libraw_0.20.2.bb | 1 |
2 files changed, 26 insertions, 0 deletions
diff --git a/meta-oe/recipes-support/libraw/libraw/CVE-2025-43964.patch b/meta-oe/recipes-support/libraw/libraw/CVE-2025-43964.patch new file mode 100644 index 0000000000..592c2d5ea1 --- /dev/null +++ b/meta-oe/recipes-support/libraw/libraw/CVE-2025-43964.patch | |||
| @@ -0,0 +1,25 @@ | |||
| 1 | From 0e068c2826ca6a70973ec2a75d05bc95b11e4977 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Alex Tutubalin <lexa@lexa.ru> | ||
| 3 | Date: Sun, 2 Mar 2025 11:35:43 +0300 | ||
| 4 | Subject: [PATCH] additional checks in PhaseOne correction tag 0x412 processing | ||
| 5 | |||
| 6 | CVE: CVE-2025-43964 | ||
| 7 | Upstream-Status: Backport [https://github.com/LibRaw/LibRaw/commit/a50dc3f1127d2e37a9b39f57ad9bb2ebb60f18c0] | ||
| 8 | Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> | ||
| 9 | --- | ||
| 10 | src/decoders/load_mfbacks.cpp | 2 ++ | ||
| 11 | 1 file changed, 2 insertions(+) | ||
| 12 | |||
| 13 | diff --git a/src/decoders/load_mfbacks.cpp b/src/decoders/load_mfbacks.cpp | ||
| 14 | index 00a9bc1e..8ba791c6 100644 | ||
| 15 | --- a/src/decoders/load_mfbacks.cpp | ||
| 16 | +++ b/src/decoders/load_mfbacks.cpp | ||
| 17 | @@ -336,6 +336,8 @@ int LibRaw::phase_one_correct() | ||
| 18 | unsigned w0 = head[1] * head[3], w1 = head[2] * head[4]; | ||
| 19 | if (w0 > 10240000 || w1 > 10240000) | ||
| 20 | throw LIBRAW_EXCEPTION_ALLOC; | ||
| 21 | + if (w0 < 1 || w1 < 1) | ||
| 22 | + throw LIBRAW_EXCEPTION_IO_CORRUPT; | ||
| 23 | yval[0] = (float *)calloc(head[1] * head[3] + head[2] * head[4], 6); | ||
| 24 | merror(yval[0], "phase_one_correct()"); | ||
| 25 | yval[1] = (float *)(yval[0] + head[1] * head[3]); | ||
diff --git a/meta-oe/recipes-support/libraw/libraw_0.20.2.bb b/meta-oe/recipes-support/libraw/libraw_0.20.2.bb index 8d82d3a49c..3ac2d3e795 100644 --- a/meta-oe/recipes-support/libraw/libraw_0.20.2.bb +++ b/meta-oe/recipes-support/libraw/libraw_0.20.2.bb | |||
| @@ -6,6 +6,7 @@ SRC_URI = "git://github.com/LibRaw/LibRaw.git;branch=master;protocol=https \ | |||
| 6 | file://CVE-2023-1729.patch \ | 6 | file://CVE-2023-1729.patch \ |
| 7 | file://CVE-2025-43961-43962.patch \ | 7 | file://CVE-2025-43961-43962.patch \ |
| 8 | file://CVE-2025-43963.patch \ | 8 | file://CVE-2025-43963.patch \ |
| 9 | file://CVE-2025-43964.patch \ | ||
| 9 | " | 10 | " |
| 10 | SRCREV = "0209b6a2caec189e6d1a9b21c10e9e49f46e5a92" | 11 | SRCREV = "0209b6a2caec189e6d1a9b21c10e9e49f46e5a92" |
| 11 | S = "${WORKDIR}/git" | 12 | S = "${WORKDIR}/git" |
