diff options
author | Armin Kuster <akuster808@gmail.com> | 2016-12-10 09:38:43 -0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-12-13 22:47:33 +0000 |
commit | 9945cbccc4c737c84ad441773061acbf90c7baed (patch) | |
tree | 19446d6a6bee8d9313abb332df9ba71dbbb86fce /meta/recipes-multimedia/libtiff/files/CVE-2016-9540.patch | |
parent | facf9fa905100945738c13f9f79e938ed4a81030 (diff) | |
download | openembedded-core-9945cbccc4c737c84ad441773061acbf90c7baed.tar.gz |
libtiff: Update to 4.0.7
Major changes:
The libtiff tools bmp2tiff, gif2tiff, ras2tiff, sgi2tiff, sgisv, and ycbcr are completely removed from the distribution, used for demos.
CVEs fixed:
CVE-2016-9297
CVE-2016-9448
CVE-2016-9273
CVE-2014-8127
CVE-2016-3658
CVE-2016-5875
CVE-2016-5652
CVE-2016-3632
plus more that are not identified in the changelog.
removed patches integrated into update.
more info: http://libtiff.maptools.org/v4.0.7.html
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Diffstat (limited to 'meta/recipes-multimedia/libtiff/files/CVE-2016-9540.patch')
-rw-r--r-- | meta/recipes-multimedia/libtiff/files/CVE-2016-9540.patch | 60 |
1 files changed, 0 insertions, 60 deletions
diff --git a/meta/recipes-multimedia/libtiff/files/CVE-2016-9540.patch b/meta/recipes-multimedia/libtiff/files/CVE-2016-9540.patch deleted file mode 100644 index dddaa0c87e..0000000000 --- a/meta/recipes-multimedia/libtiff/files/CVE-2016-9540.patch +++ /dev/null @@ -1,60 +0,0 @@ -From 5ad9d8016fbb60109302d558f7edb2cb2a3bb8e3 Mon Sep 17 00:00:00 2001 -From: erouault <erouault> -Date: Sat, 8 Oct 2016 15:54:56 +0000 -Subject: [PATCH] fix CVE-2016-9540 - * tools/tiffcp.c: fix out-of-bounds write on tiled images with odd - tile width vs image width. Reported as MSVR 35103 - by Axel Souchet and Vishal Chauhan from the MSRC Vulnerabilities & - Mitigations team. - -CVE: CVE-2016-9540 - -Upstream-Status: Backport -https://github.com/vadz/libtiff/commit/5ad9d8016fbb60109302d558f7edb2cb2a3bb8e3 - -Signed-off-by: Zhixiong Chi <zhixiong.chi@windriver.com> ---- - ChangeLog | 7 +++++++ - tools/tiffcp.c | 4 ++-- - 2 files changed, 9 insertions(+), 2 deletions(-) - -Index: tiff-4.0.4/ChangeLog -=================================================================== ---- tiff-4.0.4.orig/ChangeLog 2016-11-24 14:40:43.046867737 +0800 -+++ tiff-4.0.4/ChangeLog 2016-11-28 14:38:01.681276171 +0800 -@@ -17,6 +17,13 @@ - Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2500 - (CVE-2014-8127, duplicate: CVE-2016-3658) - -+2016-10-08 Even Rouault <even.rouault at spatialys.com> -+ -+ * tools/tiffcp.c: fix out-of-bounds write on tiled images with odd -+ tile width vs image width. Reported as MSVR 35103 -+ by Axel Souchet and Vishal Chauhan from the MSRC Vulnerabilities & -+ Mitigations team. -+ - 2016-09-24 Bob Friesenhahn <bfriesen@simple.dallas.tx.us> - - * libtiff/tif_getimage.c (TIFFRGBAImageOK): Reject attempts to -Index: tiff-4.0.4/tools/tiffcp.c -=================================================================== ---- tiff-4.0.4.orig/tools/tiffcp.c 2015-06-21 09:09:10.000000000 +0800 -+++ tiff-4.0.4/tools/tiffcp.c 2016-11-28 14:41:02.221277430 +0800 -@@ -1338,7 +1338,7 @@ - uint32 colb = 0; - uint32 col; - -- for (col = 0; col < imagewidth; col += tw) { -+ for (col = 0; col < imagewidth && colb < imagew; col += tw) { - if (TIFFReadTile(in, tilebuf, col, row, 0, 0) < 0 - && !ignore) { - TIFFError(TIFFFileName(in), -@@ -1523,7 +1523,7 @@ - uint32 colb = 0; - uint32 col; - -- for (col = 0; col < imagewidth; col += tw) { -+ for (col = 0; col < imagewidth && colb < imagew; col += tw) { - /* - * Tile is clipped horizontally. Calculate - * visible portion and skewing factors. |