[packages/libtiff] upstream fixes for CVE-2013-4231, CVE-2013-4232

draenog draenog at pld-linux.org
Tue Aug 20 03:34:17 CEST 2013


commit 24c59827abf415890e82a30574782238e4aedc54
Author: Kacper Kornet <draenog at pld-linux.org>
Date:   Tue Aug 20 02:32:43 2013 +0100

    upstream fixes for CVE-2013-4231, CVE-2013-4232

 libtiff-CVE-2013-4231.patch | 19 +++++++++++++++++++
 libtiff-CVE-2013-4232.patch | 22 ++++++++++++++++++++++
 libtiff.spec                |  6 +++++-
 3 files changed, 46 insertions(+), 1 deletion(-)
---
diff --git a/libtiff.spec b/libtiff.spec
index 49970e5..3fb3d5b 100644
--- a/libtiff.spec
+++ b/libtiff.spec
@@ -10,7 +10,7 @@ Summary(pl.UTF-8):	Biblioteka do manipulacji plikami w formacie TIFF
 Summary(tr.UTF-8):	TIFF dosyalarını işleme kitaplığı
 Name:		libtiff
 Version:	4.0.3
-Release:	3
+Release:	4
 License:	BSD-like
 Group:		Libraries
 Source0:	http://download.osgeo.org/libtiff/tiff-%{version}.tar.gz
@@ -20,6 +20,8 @@ Patch1:	        %{name}-CVE-2012-4447.patch
 Patch2:	        %{name}-CVE-2012-4564.patch
 Patch3:		%{name}-CVE-2013-1960.patch
 Patch4:		%{name}-CVE-2013-1961.patch
+Patch5:		%{name}-CVE-2013-4231.patch
+Patch6:		%{name}-CVE-2013-4232.patch
 URL:		http://www.remotesensing.org/libtiff/
 %{?with_opengl:BuildRequires:  OpenGL-glut-devel}
 BuildRequires:	autoconf >= 2.64
@@ -174,6 +176,8 @@ tiffgt - program do oglądania plików tiff oparty o OpenGL.
 %patch2 -p1
 %patch3 -p1
 %patch4 -p1
+%patch5 -p1
+%patch6 -p1
 
 %build
 %{__libtoolize}
diff --git a/libtiff-CVE-2013-4231.patch b/libtiff-CVE-2013-4231.patch
new file mode 100644
index 0000000..84e069a
--- /dev/null
+++ b/libtiff-CVE-2013-4231.patch
@@ -0,0 +1,19 @@
+commit 4893813409a79748ddc9f8d9a0cc183af51a662c
+Author: fwarmerdam <fwarmerdam>
+Date:   Wed Aug 14 05:18:53 2013 +0000
+
+    make more resistent to corrupt/hostile input files (#2450, CVE-2013-4231)
+
+diff --git a/tools/gif2tiff.c b/tools/gif2tiff.c
+index 17f7a19..4093411 100644
+--- a/tools/gif2tiff.c
++++ b/tools/gif2tiff.c
+@@ -333,6 +333,8 @@ readraster(void)
+     int status = 1;
+ 
+     datasize = getc(infile);
++    if (datasize > 12)
++	return 0;
+     clear = 1 << datasize;
+     eoi = clear + 1;
+     avail = clear + 2;
diff --git a/libtiff-CVE-2013-4232.patch b/libtiff-CVE-2013-4232.patch
new file mode 100644
index 0000000..2107344
--- /dev/null
+++ b/libtiff-CVE-2013-4232.patch
@@ -0,0 +1,22 @@
+commit 0583f9859af8862c5a8748cb8a2a93673a5de3d4
+Author: fwarmerdam <fwarmerdam>
+Date:   Wed Aug 14 05:11:36 2013 +0000
+
+    ensure return after memory allocation failure (#2449, CVS-2013-4232)
+
+diff --git a/ChangeLog b/ChangeLog
+index 1a6c779..449555d 100644
+diff --git a/tools/tiff2pdf.c b/tools/tiff2pdf.c
+index 109f618..951f44b 100644
+--- a/tools/tiff2pdf.c
++++ b/tools/tiff2pdf.c
+@@ -2461,7 +2461,8 @@ tsize_t t2p_readwrite_pdf_image(T2P* t2p, TIFF* input, TIFF* output){
+ 					(unsigned long) t2p->tiff_datasize, 
+ 					TIFFFileName(input));
+ 				t2p->t2p_error = T2P_ERR_ERROR;
+-			  _TIFFfree(buffer);
++				_TIFFfree(buffer);
++				return(0);
+ 			} else {
+ 				buffer=samplebuffer;
+ 				t2p->tiff_datasize *= t2p->tiff_samplesperpixel;
================================================================

---- gitweb:

http://git.pld-linux.org/gitweb.cgi/packages/libtiff.git/commitdiff/24c59827abf415890e82a30574782238e4aedc54



More information about the pld-cvs-commit mailing list