From: Wei Cai <wei....@windriver.com> [ CQID: WIND00374012 ]
A heap-based buffer overflow flaw was found in the way tiff2pdf, a TIFF image to a PDF document conversion tool, of libtiff, a library of functions for manipulating TIFF (Tagged Image File Format) image format files, performed write of TIFF image content into particular PDF document file, when not properly initialized T2P context struct pointer has been provided by tiff2pdf (application requesting the conversion) as one of parameters for the routine performing the write. A remote attacker could provide a specially-crafted TIFF image format file, that when processed by tiff2pdf would lead to tiff2pdf executable crash or, potentially, arbitrary code execution with the privileges of the user running the tiff2pdf binary. Signed-off-by: Wei Cai <wei....@windriver.com> Signed-off-by: Robert Yang <liezhi.y...@windriver.com> Affects libtiff 4.0.2 and earlier. Signed-off-by: Mark Hatle <mark.ha...@windriver.com> --- .../libtiff/files/libtiff-CVE-2012-3401.patch | 10 ++++++++++ meta/recipes-multimedia/libtiff/tiff_4.0.1.bb | 3 ++- 2 files changed, 12 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-multimedia/libtiff/files/libtiff-CVE-2012-3401.patch diff --git a/meta/recipes-multimedia/libtiff/files/libtiff-CVE-2012-3401.patch b/meta/recipes-multimedia/libtiff/files/libtiff-CVE-2012-3401.patch new file mode 100644 index 0000000..e59addd --- /dev/null +++ b/meta/recipes-multimedia/libtiff/files/libtiff-CVE-2012-3401.patch @@ -0,0 +1,10 @@ +--- a/tools/tiff2pdf.c.orig 2012-11-22 17:24:46.000000000 +0800 ++++ b/tools/tiff2pdf.c 2012-11-22 17:25:41.000000000 +0800 +@@ -1038,6 +1038,7 @@ + "Can't set directory %u of input file %s", + i, + TIFFFileName(input)); ++ t2p->t2p_error = T2P_ERR_ERROR; + return; + } + if(TIFFGetField(input, TIFFTAG_PAGENUMBER, &pagen, &paged)){ diff --git a/meta/recipes-multimedia/libtiff/tiff_4.0.1.bb b/meta/recipes-multimedia/libtiff/tiff_4.0.1.bb index 54c4cbc..4bc7499 100644 --- a/meta/recipes-multimedia/libtiff/tiff_4.0.1.bb +++ b/meta/recipes-multimedia/libtiff/tiff_4.0.1.bb @@ -6,7 +6,8 @@ DEPENDS = "zlib jpeg xz" PR = "r1" SRC_URI = "ftp://ftp.remotesensing.org/pub/libtiff/tiff-${PV}.tar.gz \ - file://libtool2.patch" + file://libtool2.patch \ + file://libtiff-CVE-2012-3401.patch" SRC_URI[md5sum] = "fae149cc9da35c598d8be897826dfc63" SRC_URI[sha256sum] = "9a7a039e516c37478038740f1642818250bfb1414cf404cc8b569e5f9d4bf2f0" -- 1.8.1.2.545.g2f19ada _______________________________________________ Openembedded-core mailing list Openembedded-core@lists.openembedded.org http://lists.linuxtogo.org/cgi-bin/mailman/listinfo/openembedded-core