summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorYogita Urade <yogita.urade@windriver.com>2025-08-06 17:54:12 +0530
committerSteve Sakoman <steve@sakoman.com>2025-08-18 13:18:01 -0700
commitc2581b7811559bd2220b1d06c027ff612e5295e9 (patch)
tree22ee564b6b2660178150710717c34414784e23cb
parent81ab000fa437ca04f584a3327b076f7a512dc6d0 (diff)
downloadpoky-c2581b7811559bd2220b1d06c027ff612e5295e9.tar.gz
tiff: fix CVE-2025-8176
A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as critical. This vulnerability affects the function get_histogram of the file tools/tiffmedian.c. The manipulation leads to use after free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as fe10872e53efba9cc36c66ac4ab3b41a839d5172. It is recommended to apply a patch to fix this issue. Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-8176 Upstream patches: https://gitlab.com/libtiff/libtiff/-/commit/3994cf3b3bc6b54c32f240ca5a412cffa11633fa https://gitlab.com/libtiff/libtiff/-/commit/ce46f002eca4148497363f80fab33f9396bcbeda https://gitlab.com/libtiff/libtiff/-/commit/ecc4ddbf1f0fed7957d1e20361e37f01907898e0 (From OE-Core rev: 5dbc4ccce8676b016de8c1393c2f0d0f74eb9337) Signed-off-by: Yogita Urade <yogita.urade@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
-rw-r--r--meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0001.patch61
-rw-r--r--meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0002.patch31
-rw-r--r--meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0003.patch28
-rw-r--r--meta/recipes-multimedia/libtiff/tiff_4.3.0.bb3
4 files changed, 123 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0001.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0001.patch
new file mode 100644
index 0000000000..83dc695528
--- /dev/null
+++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0001.patch
@@ -0,0 +1,61 @@
1From 3994cf3b3bc6b54c32f240ca5a412cffa11633fa Mon Sep 17 00:00:00 2001
2From: Lee Howard <faxguy@howardsilvan.com>
3Date: Mon, 19 May 2025 10:53:30 -0700
4Subject: [PATCH] Don't skip the first line of the input image. Addresses
5 issue #703
6
7CVE: CVE-2025-8176
8Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/3994cf3b3bc6b54c32f240ca5a412cffa11633fa]
9
10Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
11---
12 tools/tiffdither.c | 4 ++--
13 tools/tiffmedian.c | 4 ++--
14 2 files changed, 4 insertions(+), 4 deletions(-)
15
16diff --git a/tools/tiffdither.c b/tools/tiffdither.c
17index 062fd60..d352554 100644
18--- a/tools/tiffdither.c
19+++ b/tools/tiffdither.c
20@@ -95,7 +95,7 @@ fsdither(TIFF* in, TIFF* out)
21 nextptr = nextline;
22 for (j = 0; j < imagewidth; ++j)
23 *nextptr++ = *inptr++;
24- for (i = 1; i < imagelength; ++i) {
25+ for (i = 0; i < imagelength; ++i) {
26 tmpptr = thisline;
27 thisline = nextline;
28 nextline = tmpptr;
29@@ -138,7 +138,7 @@ fsdither(TIFF* in, TIFF* out)
30 nextptr[0] += v / 16;
31 }
32 }
33- if (TIFFWriteScanline(out, outline, i-1, 0) < 0)
34+ if (TIFFWriteScanline(out, outline, i, 0) < 0)
35 goto skip_on_error;
36 }
37 goto exit_label;
38diff --git a/tools/tiffmedian.c b/tools/tiffmedian.c
39index 93a1741..93e57cf 100644
40--- a/tools/tiffmedian.c
41+++ b/tools/tiffmedian.c
42@@ -844,7 +844,7 @@ quant_fsdither(TIFF* in, TIFF* out)
43 outline = (unsigned char *) _TIFFmalloc(TIFFScanlineSize(out));
44
45 GetInputLine(in, 0, goto bad); /* get first line */
46- for (i = 1; i <= imagelength; ++i) {
47+ for (i = 0; i <= imagelength; ++i) {
48 SWAP(short *, thisline, nextline);
49 lastline = (i >= imax);
50 if (i <= imax)
51@@ -915,7 +915,7 @@ quant_fsdither(TIFF* in, TIFF* out)
52 nextptr += 3;
53 }
54 }
55- if (TIFFWriteScanline(out, outline, i-1, 0) < 0)
56+ if (TIFFWriteScanline(out, outline, i, 0) < 0)
57 break;
58 }
59 bad:
60--
612.40.0
diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0002.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0002.patch
new file mode 100644
index 0000000000..c28969e1d8
--- /dev/null
+++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0002.patch
@@ -0,0 +1,31 @@
1From ce46f002eca4148497363f80fab33f9396bcbeda Mon Sep 17 00:00:00 2001
2From: Lee Howard <faxguy@howardsilvan.com>
3Date: Sat, 24 May 2025 21:25:16 -0700
4Subject: [PATCH] Fix tiffmedian bug #707
5
6CVE: CVE-2025-8176
7Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/ce46f002eca4148497363f80fab33f9396bcbeda]
8
9Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
10---
11 tools/tiffmedian.c | 5 ++++-
12 1 file changed, 4 insertions(+), 1 deletion(-)
13
14diff --git a/tools/tiffmedian.c b/tools/tiffmedian.c
15index 93e57cf..a0b4b5d 100644
16--- a/tools/tiffmedian.c
17+++ b/tools/tiffmedian.c
18@@ -385,7 +385,10 @@ get_histogram(TIFF* in, Colorbox* box)
19 }
20 for (i = 0; i < imagelength; i++) {
21 if (TIFFReadScanline(in, inputline, i, 0) <= 0)
22- break;
23+ {
24+ fprintf(stderr, "Error reading scanline\n");
25+ exit(EXIT_FAILURE);
26+ }
27 inptr = inputline;
28 for (j = imagewidth; j-- > 0;) {
29 red = (*inptr++) & 0xff >> COLOR_SHIFT;
30--
312.40.0
diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0003.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0003.patch
new file mode 100644
index 0000000000..b5ee36c5b8
--- /dev/null
+++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8176-0003.patch
@@ -0,0 +1,28 @@
1From ecc4ddbf1f0fed7957d1e20361e37f01907898e0 Mon Sep 17 00:00:00 2001
2From: Lee Howard <faxguy@howardsilvan.com>
3Date: Sat, 24 May 2025 21:38:09 -0700
4Subject: [PATCH] conflict resolution
5
6CVE: CVE-2025-8176
7Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/ecc4ddbf1f0fed7957d1e20361e37f01907898e0]
8
9Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
10---
11 tools/tiffmedian.c | 2 +-
12 1 file changed, 1 insertion(+), 1 deletion(-)
13
14diff --git a/tools/tiffmedian.c b/tools/tiffmedian.c
15index a0b4b5d..ca1c51f 100644
16--- a/tools/tiffmedian.c
17+++ b/tools/tiffmedian.c
18@@ -847,7 +847,7 @@ quant_fsdither(TIFF* in, TIFF* out)
19 outline = (unsigned char *) _TIFFmalloc(TIFFScanlineSize(out));
20
21 GetInputLine(in, 0, goto bad); /* get first line */
22- for (i = 0; i <= imagelength; ++i) {
23+ for (i = 0; i < imagelength; ++i) {
24 SWAP(short *, thisline, nextline);
25 lastline = (i >= imax);
26 if (i <= imax)
27--
282.40.0
diff --git a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
index 5ec7b20e61..6ff31bd0bb 100644
--- a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
+++ b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
@@ -55,6 +55,9 @@ SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \
55 file://CVE-2023-6277-4.patch \ 55 file://CVE-2023-6277-4.patch \
56 file://CVE-2024-7006.patch \ 56 file://CVE-2024-7006.patch \
57 file://CVE-2023-3164.patch \ 57 file://CVE-2023-3164.patch \
58 file://CVE-2025-8176-0001.patch \
59 file://CVE-2025-8176-0002.patch \
60 file://CVE-2025-8176-0003.patch \
58 " 61 "
59 62
60SRC_URI[sha256sum] = "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8" 63SRC_URI[sha256sum] = "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8"