diff options
author | Fan Xin <fan.xin@jp.fujitsu.com> | 2017-06-07 17:11:56 +0900 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2017-06-09 17:12:06 +0100 |
commit | 825927e85933322e6f195f0d937359017a9a9b97 (patch) | |
tree | d291e63367b1bed4e976d6acdef6878c83b81e55 /meta | |
parent | 3cd7aa486527d34bf6d20dd37046fe683230a4b6 (diff) | |
download | openembedded-core-825927e85933322e6f195f0d937359017a9a9b97.tar.gz openembedded-core-825927e85933322e6f195f0d937359017a9a9b97.tar.bz2 openembedded-core-825927e85933322e6f195f0d937359017a9a9b97.zip |
libtiff: Upgrade to 4.0.8
1. Upgrade libtiff from 4.0.7 to 4.0.8
2. Delete the following patch file due to CVE-2017-5225 has been fixed in 4.0.8
libtiff-CVE-2017-5225.patch
Signed-off-by: Fan Xin <fan.xin@jp.fujitsu.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Diffstat (limited to 'meta')
-rw-r--r-- | meta/recipes-multimedia/libtiff/files/libtiff-CVE-2017-5225.patch | 92 | ||||
-rw-r--r-- | meta/recipes-multimedia/libtiff/tiff_4.0.8.bb (renamed from meta/recipes-multimedia/libtiff/tiff_4.0.7.bb) | 5 |
2 files changed, 2 insertions, 95 deletions
diff --git a/meta/recipes-multimedia/libtiff/files/libtiff-CVE-2017-5225.patch b/meta/recipes-multimedia/libtiff/files/libtiff-CVE-2017-5225.patch deleted file mode 100644 index 3263353a75..0000000000 --- a/meta/recipes-multimedia/libtiff/files/libtiff-CVE-2017-5225.patch +++ /dev/null @@ -1,92 +0,0 @@ -From a24df1e93833dfeaa69bf4d510518dc4684db64d Mon Sep 17 00:00:00 2001 -From: Li Zhou <li.zhou@windriver.com> -Date: Wed, 25 Jan 2017 17:07:21 +0800 -Subject: [PATCH] libtiff: fix CVE-2017-5225 - -tools/tiffcp.c: error out cleanly in cpContig2SeparateByRow -and cpSeparate2ContigByRow if BitsPerSample != 8 to avoid heap based -overflow. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2656 and -http://bugzilla.maptools.org/show_bug.cgi?id=2657 - -Upstream-Status: Backport -CVE: CVE-2017-5225 -Signed-off-by: Li Zhou <li.zhou@windriver.com> ---- - ChangeLog | 7 +++++++ - tools/tiffcp.c | 24 ++++++++++++++++++++++-- - 2 files changed, 29 insertions(+), 2 deletions(-) - -diff --git a/ChangeLog b/ChangeLog -index 9b9d397..7e82795 100644 ---- a/ChangeLog -+++ b/ChangeLog -@@ -1,3 +1,10 @@ -+2017-01-11 Even Rouault <even.rouault at spatialys.com> -+ -+ * tools/tiffcp.c: error out cleanly in cpContig2SeparateByRow and -+ cpSeparate2ContigByRow if BitsPerSample != 8 to avoid heap based overflow. -+ Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2656 and -+ http://bugzilla.maptools.org/show_bug.cgi?id=2657 -+ - 2016-11-19 Bob Friesenhahn <bfriesen@simple.dallas.tx.us> - - * libtiff 4.0.7 released. -diff --git a/tools/tiffcp.c b/tools/tiffcp.c -index 338a3d1..2e84577 100644 ---- a/tools/tiffcp.c -+++ b/tools/tiffcp.c -@@ -592,7 +592,7 @@ static copyFunc pickCopyFunc(TIFF*, TIFF*, uint16, uint16); - static int - tiffcp(TIFF* in, TIFF* out) - { -- uint16 bitspersample, samplesperpixel = 1; -+ uint16 bitspersample = 1, samplesperpixel = 1; - uint16 input_compression, input_photometric = PHOTOMETRIC_MINISBLACK; - copyFunc cf; - uint32 width, length; -@@ -1068,6 +1068,16 @@ DECLAREcpFunc(cpContig2SeparateByRow) - register uint32 n; - uint32 row; - tsample_t s; -+ uint16 bps = 0; -+ -+ (void) TIFFGetField(in, TIFFTAG_BITSPERSAMPLE, &bps); -+ if( bps != 8 ) -+ { -+ TIFFError(TIFFFileName(in), -+ "Error, can only handle BitsPerSample=8 in %s", -+ "cpContig2SeparateByRow"); -+ return 0; -+ } - - inbuf = _TIFFmalloc(scanlinesizein); - outbuf = _TIFFmalloc(scanlinesizeout); -@@ -1121,6 +1131,16 @@ DECLAREcpFunc(cpSeparate2ContigByRow) - register uint32 n; - uint32 row; - tsample_t s; -+ uint16 bps = 0; -+ -+ (void) TIFFGetField(in, TIFFTAG_BITSPERSAMPLE, &bps); -+ if( bps != 8 ) -+ { -+ TIFFError(TIFFFileName(in), -+ "Error, can only handle BitsPerSample=8 in %s", -+ "cpSeparate2ContigByRow"); -+ return 0; -+ } - - inbuf = _TIFFmalloc(scanlinesizein); - outbuf = _TIFFmalloc(scanlinesizeout); -@@ -1763,7 +1783,7 @@ pickCopyFunc(TIFF* in, TIFF* out, uint16 bitspersample, uint16 samplesperpixel) - uint32 w, l, tw, tl; - int bychunk; - -- (void) TIFFGetField(in, TIFFTAG_PLANARCONFIG, &shortv); -+ (void) TIFFGetFieldDefaulted(in, TIFFTAG_PLANARCONFIG, &shortv); - if (shortv != config && bitspersample != 8 && samplesperpixel > 1) { - fprintf(stderr, - "%s: Cannot handle different planar configuration w/ bits/sample != 8\n", --- -1.9.1 - diff --git a/meta/recipes-multimedia/libtiff/tiff_4.0.7.bb b/meta/recipes-multimedia/libtiff/tiff_4.0.8.bb index e58173604e..4a7aeccd23 100644 --- a/meta/recipes-multimedia/libtiff/tiff_4.0.7.bb +++ b/meta/recipes-multimedia/libtiff/tiff_4.0.8.bb @@ -6,11 +6,10 @@ CVE_PRODUCT = "libtiff" SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \ file://libtool2.patch \ - file://libtiff-CVE-2017-5225.patch \ " -SRC_URI[md5sum] = "77ae928d2c6b7fb46a21c3a29325157b" -SRC_URI[sha256sum] = "9f43a2cfb9589e5cecaa66e16bf87f814c945f22df7ba600d63aac4632c4f019" +SRC_URI[md5sum] = "2a7d1c1318416ddf36d5f6fa4600069b" +SRC_URI[sha256sum] = "59d7a5a8ccd92059913f246877db95a2918e6c04fb9d43fd74e5c3390dac2910" # exclude betas UPSTREAM_CHECK_REGEX = "tiff-(?P<pver>\d+(\.\d+)+).tar" |