diff options
author | Yogita Urade <yogita.urade@windriver.com> | 2025-08-26 16:18:32 +0530 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2025-09-08 08:27:11 -0700 |
commit | 41c69cd099735be8380ec5a6a9a72e30628e8099 (patch) | |
tree | ce8c3bb900436a941adb90518065730ee29a3124 | |
parent | d655701622de0228e28324c0a1e8eabf73668e56 (diff) | |
download | poky-41c69cd099735be8380ec5a6a9a72e30628e8099.tar.gz |
tiff: fix CVE-2024-13978
A vulnerability was found in LibTIFF up to 4.7.0. It has been declared
as problematic. Affected by this vulnerability is the function
t2p_read_tiff_init of the file tools/tiff2pdf.c of the component fax2ps.
The manipulation leads to null pointer dereference. The attack needs to
be approached locally. The complexity of an attack is rather high. The
exploitation appears to be difficult. The patch is named
2ebfffb0e8836bfb1cd7d85c059cd285c59761a4. It is recommended to apply a
patch to fix this issue.
Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-13978
Upstream patch:
https://gitlab.com/libtiff/libtiff/-/commit/2ebfffb0e8836bfb1cd7d85c059cd285c59761a4
(From OE-Core rev: f6ff692be6b08290845b6c6c27eaf5d676476464)
Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
-rw-r--r-- | meta/recipes-multimedia/libtiff/tiff/CVE-2024-13978.patch | 47 | ||||
-rw-r--r-- | meta/recipes-multimedia/libtiff/tiff_4.3.0.bb | 1 |
2 files changed, 48 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2024-13978.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2024-13978.patch new file mode 100644 index 0000000000..3a4845d415 --- /dev/null +++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2024-13978.patch | |||
@@ -0,0 +1,47 @@ | |||
1 | From 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4 Mon Sep 17 00:00:00 2001 | ||
2 | From: Lee Howard <faxguy@howardsilvan.com> | ||
3 | Date: Sat, 5 Oct 2024 09:45:30 -0700 | ||
4 | Subject: [PATCH] Check TIFFTAG_TILELENGTH and TIFFTAGTILEWIDTH for valid | ||
5 | input, addresses issue #650 | ||
6 | |||
7 | CVE: CVE-2024-13978 | ||
8 | Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/2ebfffb0e8836bfb1cd7d85c059cd285c59761a4] | ||
9 | |||
10 | Signed-off-by: Yogita Urade <yogita.urade@windriver.com> | ||
11 | --- | ||
12 | tools/tiff2pdf.c | 16 ++++++++++++++++ | ||
13 | 1 file changed, 16 insertions(+) | ||
14 | |||
15 | diff --git a/tools/tiff2pdf.c b/tools/tiff2pdf.c | ||
16 | index 63751f1..fef28d1 100644 | ||
17 | --- a/tools/tiff2pdf.c | ||
18 | +++ b/tools/tiff2pdf.c | ||
19 | @@ -1255,9 +1255,25 @@ void t2p_read_tiff_init(T2P* t2p, TIFF* input){ | ||
20 | TIFFGetField(input, | ||
21 | TIFFTAG_TILEWIDTH, | ||
22 | &( t2p->tiff_tiles[i].tiles_tilewidth) ); | ||
23 | + if (t2p->tiff_tiles[i].tiles_tilewidth < 1) | ||
24 | + { | ||
25 | + TIFFError(TIFF2PDF_MODULE, "Invalid tile width (%d), %s", | ||
26 | + t2p->tiff_tiles[i].tiles_tilewidth, | ||
27 | + TIFFFileName(input)); | ||
28 | + t2p->t2p_error = T2P_ERR_ERROR; | ||
29 | + return; | ||
30 | + } | ||
31 | TIFFGetField(input, | ||
32 | TIFFTAG_TILELENGTH, | ||
33 | &( t2p->tiff_tiles[i].tiles_tilelength) ); | ||
34 | + if (t2p->tiff_tiles[i].tiles_tilelength < 1) | ||
35 | + { | ||
36 | + TIFFError(TIFF2PDF_MODULE, "Invalid tile length (%d), %s", | ||
37 | + t2p->tiff_tiles[i].tiles_tilelength, | ||
38 | + TIFFFileName(input)); | ||
39 | + t2p->t2p_error = T2P_ERR_ERROR; | ||
40 | + return; | ||
41 | + } | ||
42 | t2p->tiff_tiles[i].tiles_tiles = | ||
43 | (T2P_TILE*) _TIFFmalloc(TIFFSafeMultiply(tmsize_t,t2p->tiff_tiles[i].tiles_tilecount, | ||
44 | sizeof(T2P_TILE)) ); | ||
45 | -- | ||
46 | 2.40.0 | ||
47 | |||
diff --git a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb index 4c9c212312..d5ae82bc7c 100644 --- a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb +++ b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb | |||
@@ -59,6 +59,7 @@ SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \ | |||
59 | file://CVE-2025-8176-0002.patch \ | 59 | file://CVE-2025-8176-0002.patch \ |
60 | file://CVE-2025-8176-0003.patch \ | 60 | file://CVE-2025-8176-0003.patch \ |
61 | file://CVE-2025-8177.patch \ | 61 | file://CVE-2025-8177.patch \ |
62 | file://CVE-2024-13978.patch \ | ||
62 | " | 63 | " |
63 | 64 | ||
64 | SRC_URI[sha256sum] = "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8" | 65 | SRC_URI[sha256sum] = "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8" |