summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorYogita Urade <yogita.urade@windriver.com>2025-08-26 16:18:32 +0530
committerSteve Sakoman <steve@sakoman.com>2025-09-08 08:27:11 -0700
commit41c69cd099735be8380ec5a6a9a72e30628e8099 (patch)
treece8c3bb900436a941adb90518065730ee29a3124
parentd655701622de0228e28324c0a1e8eabf73668e56 (diff)
downloadpoky-41c69cd099735be8380ec5a6a9a72e30628e8099.tar.gz
tiff: fix CVE-2024-13978
A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as problematic. Affected by this vulnerability is the function t2p_read_tiff_init of the file tools/tiff2pdf.c of the component fax2ps. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The patch is named 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4. It is recommended to apply a patch to fix this issue. Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-13978 Upstream patch: https://gitlab.com/libtiff/libtiff/-/commit/2ebfffb0e8836bfb1cd7d85c059cd285c59761a4 (From OE-Core rev: f6ff692be6b08290845b6c6c27eaf5d676476464) Signed-off-by: Yogita Urade <yogita.urade@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
-rw-r--r--meta/recipes-multimedia/libtiff/tiff/CVE-2024-13978.patch47
-rw-r--r--meta/recipes-multimedia/libtiff/tiff_4.3.0.bb1
2 files changed, 48 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2024-13978.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2024-13978.patch
new file mode 100644
index 0000000000..3a4845d415
--- /dev/null
+++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2024-13978.patch
@@ -0,0 +1,47 @@
1From 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4 Mon Sep 17 00:00:00 2001
2From: Lee Howard <faxguy@howardsilvan.com>
3Date: Sat, 5 Oct 2024 09:45:30 -0700
4Subject: [PATCH] Check TIFFTAG_TILELENGTH and TIFFTAGTILEWIDTH for valid
5 input, addresses issue #650
6
7CVE: CVE-2024-13978
8Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/2ebfffb0e8836bfb1cd7d85c059cd285c59761a4]
9
10Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
11---
12 tools/tiff2pdf.c | 16 ++++++++++++++++
13 1 file changed, 16 insertions(+)
14
15diff --git a/tools/tiff2pdf.c b/tools/tiff2pdf.c
16index 63751f1..fef28d1 100644
17--- a/tools/tiff2pdf.c
18+++ b/tools/tiff2pdf.c
19@@ -1255,9 +1255,25 @@ void t2p_read_tiff_init(T2P* t2p, TIFF* input){
20 TIFFGetField(input,
21 TIFFTAG_TILEWIDTH,
22 &( t2p->tiff_tiles[i].tiles_tilewidth) );
23+ if (t2p->tiff_tiles[i].tiles_tilewidth < 1)
24+ {
25+ TIFFError(TIFF2PDF_MODULE, "Invalid tile width (%d), %s",
26+ t2p->tiff_tiles[i].tiles_tilewidth,
27+ TIFFFileName(input));
28+ t2p->t2p_error = T2P_ERR_ERROR;
29+ return;
30+ }
31 TIFFGetField(input,
32 TIFFTAG_TILELENGTH,
33 &( t2p->tiff_tiles[i].tiles_tilelength) );
34+ if (t2p->tiff_tiles[i].tiles_tilelength < 1)
35+ {
36+ TIFFError(TIFF2PDF_MODULE, "Invalid tile length (%d), %s",
37+ t2p->tiff_tiles[i].tiles_tilelength,
38+ TIFFFileName(input));
39+ t2p->t2p_error = T2P_ERR_ERROR;
40+ return;
41+ }
42 t2p->tiff_tiles[i].tiles_tiles =
43 (T2P_TILE*) _TIFFmalloc(TIFFSafeMultiply(tmsize_t,t2p->tiff_tiles[i].tiles_tilecount,
44 sizeof(T2P_TILE)) );
45--
462.40.0
47
diff --git a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
index 4c9c212312..d5ae82bc7c 100644
--- a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
+++ b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
@@ -59,6 +59,7 @@ SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \
59 file://CVE-2025-8176-0002.patch \ 59 file://CVE-2025-8176-0002.patch \
60 file://CVE-2025-8176-0003.patch \ 60 file://CVE-2025-8176-0003.patch \
61 file://CVE-2025-8177.patch \ 61 file://CVE-2025-8177.patch \
62 file://CVE-2024-13978.patch \
62 " 63 "
63 64
64SRC_URI[sha256sum] = "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8" 65SRC_URI[sha256sum] = "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8"