summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0001.patch61
-rw-r--r--meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0002.patch31
-rw-r--r--meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0003.patch28
-rw-r--r--meta/recipes-multimedia/libtiff/tiff_4.3.0.bb3
4 files changed, 123 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0001.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0001.patch
new file mode 100644
index 0000000000..83dc695528
--- /dev/null
+++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0001.patch
@@ -0,0 +1,61 @@
1From 3994cf3b3bc6b54c32f240ca5a412cffa11633fa Mon Sep 17 00:00:00 2001
2From: Lee Howard <faxguy@howardsilvan.com>
3Date: Mon, 19 May 2025 10:53:30 -0700
4Subject: [PATCH] Don't skip the first line of the input image. Addresses
5 issue #703
6
7CVE: CVE-2025-8176
8Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/3994cf3b3bc6b54c32f240ca5a412cffa11633fa]
9
10Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
11---
12 tools/tiffdither.c | 4 ++--
13 tools/tiffmedian.c | 4 ++--
14 2 files changed, 4 insertions(+), 4 deletions(-)
15
16diff --git a/tools/tiffdither.c b/tools/tiffdither.c
17index 062fd60..d352554 100644
18--- a/tools/tiffdither.c
19+++ b/tools/tiffdither.c
20@@ -95,7 +95,7 @@ fsdither(TIFF* in, TIFF* out)
21 nextptr = nextline;
22 for (j = 0; j < imagewidth; ++j)
23 *nextptr++ = *inptr++;
24- for (i = 1; i < imagelength; ++i) {
25+ for (i = 0; i < imagelength; ++i) {
26 tmpptr = thisline;
27 thisline = nextline;
28 nextline = tmpptr;
29@@ -138,7 +138,7 @@ fsdither(TIFF* in, TIFF* out)
30 nextptr[0] += v / 16;
31 }
32 }
33- if (TIFFWriteScanline(out, outline, i-1, 0) < 0)
34+ if (TIFFWriteScanline(out, outline, i, 0) < 0)
35 goto skip_on_error;
36 }
37 goto exit_label;
38diff --git a/tools/tiffmedian.c b/tools/tiffmedian.c
39index 93a1741..93e57cf 100644
40--- a/tools/tiffmedian.c
41+++ b/tools/tiffmedian.c
42@@ -844,7 +844,7 @@ quant_fsdither(TIFF* in, TIFF* out)
43 outline = (unsigned char *) _TIFFmalloc(TIFFScanlineSize(out));
44
45 GetInputLine(in, 0, goto bad); /* get first line */
46- for (i = 1; i <= imagelength; ++i) {
47+ for (i = 0; i <= imagelength; ++i) {
48 SWAP(short *, thisline, nextline);
49 lastline = (i >= imax);
50 if (i <= imax)
51@@ -915,7 +915,7 @@ quant_fsdither(TIFF* in, TIFF* out)
52 nextptr += 3;
53 }
54 }
55- if (TIFFWriteScanline(out, outline, i-1, 0) < 0)
56+ if (TIFFWriteScanline(out, outline, i, 0) < 0)
57 break;
58 }
59 bad:
60--
612.40.0
diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0002.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0002.patch
new file mode 100644
index 0000000000..c28969e1d8
--- /dev/null
+++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0002.patch
@@ -0,0 +1,31 @@
1From ce46f002eca4148497363f80fab33f9396bcbeda Mon Sep 17 00:00:00 2001
2From: Lee Howard <faxguy@howardsilvan.com>
3Date: Sat, 24 May 2025 21:25:16 -0700
4Subject: [PATCH] Fix tiffmedian bug #707
5
6CVE: CVE-2025-8176
7Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/ce46f002eca4148497363f80fab33f9396bcbeda]
8
9Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
10---
11 tools/tiffmedian.c | 5 ++++-
12 1 file changed, 4 insertions(+), 1 deletion(-)
13
14diff --git a/tools/tiffmedian.c b/tools/tiffmedian.c
15index 93e57cf..a0b4b5d 100644
16--- a/tools/tiffmedian.c
17+++ b/tools/tiffmedian.c
18@@ -385,7 +385,10 @@ get_histogram(TIFF* in, Colorbox* box)
19 }
20 for (i = 0; i < imagelength; i++) {
21 if (TIFFReadScanline(in, inputline, i, 0) <= 0)
22- break;
23+ {
24+ fprintf(stderr, "Error reading scanline\n");
25+ exit(EXIT_FAILURE);
26+ }
27 inptr = inputline;
28 for (j = imagewidth; j-- > 0;) {
29 red = (*inptr++) & 0xff >> COLOR_SHIFT;
30--
312.40.0
diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0003.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0003.patch
new file mode 100644
index 0000000000..b5ee36c5b8
--- /dev/null
+++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0003.patch
@@ -0,0 +1,28 @@
1From ecc4ddbf1f0fed7957d1e20361e37f01907898e0 Mon Sep 17 00:00:00 2001
2From: Lee Howard <faxguy@howardsilvan.com>
3Date: Sat, 24 May 2025 21:38:09 -0700
4Subject: [PATCH] conflict resolution
5
6CVE: CVE-2025-8176
7Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/ecc4ddbf1f0fed7957d1e20361e37f01907898e0]
8
9Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
10---
11 tools/tiffmedian.c | 2 +-
12 1 file changed, 1 insertion(+), 1 deletion(-)
13
14diff --git a/tools/tiffmedian.c b/tools/tiffmedian.c
15index a0b4b5d..ca1c51f 100644
16--- a/tools/tiffmedian.c
17+++ b/tools/tiffmedian.c
18@@ -847,7 +847,7 @@ quant_fsdither(TIFF* in, TIFF* out)
19 outline = (unsigned char *) _TIFFmalloc(TIFFScanlineSize(out));
20
21 GetInputLine(in, 0, goto bad); /* get first line */
22- for (i = 0; i <= imagelength; ++i) {
23+ for (i = 0; i < imagelength; ++i) {
24 SWAP(short *, thisline, nextline);
25 lastline = (i >= imax);
26 if (i <= imax)
27--
282.40.0
diff --git a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
index 5ec7b20e61..6ff31bd0bb 100644
--- a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
+++ b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
@@ -55,6 +55,9 @@ SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \
55 file://CVE-2023-6277-4.patch \ 55 file://CVE-2023-6277-4.patch \
56 file://CVE-2024-7006.patch \ 56 file://CVE-2024-7006.patch \
57 file://CVE-2023-3164.patch \ 57 file://CVE-2023-3164.patch \
58 file://CVE-2025-8176-0001.patch \
59 file://CVE-2025-8176-0002.patch \
60 file://CVE-2025-8176-0003.patch \
58 " 61 "
59 62
60SRC_URI[sha256sum] = "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8" 63SRC_URI[sha256sum] = "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8"