8e28d22c91
* gnu/packages/patches/libtiff-CVE-2012-4564.patch, gnu/packages/patches/libtiff-CVE-2013-1960.patch, gnu/packages/patches/libtiff-CVE-2013-1961.patch, gnu/packages/patches/libtiff-CVE-2013-4231.patch, gnu/packages/patches/libtiff-CVE-2013-4232.patch, gnu/packages/patches/libtiff-CVE-2013-4243.patch, gnu/packages/patches/libtiff-CVE-2013-4244.patch, gnu/packages/patches/libtiff-CVE-2014-8127-pt1.patch, gnu/packages/patches/libtiff-CVE-2014-8127-pt2.patch, gnu/packages/patches/libtiff-CVE-2014-8127-pt3.patch, gnu/packages/patches/libtiff-CVE-2014-8127-pt4.patch, gnu/packages/patches/libtiff-CVE-2014-8128-pt1.patch, gnu/packages/patches/libtiff-CVE-2014-8128-pt2.patch, gnu/packages/patches/libtiff-CVE-2014-8128-pt3.patch, gnu/packages/patches/libtiff-CVE-2014-8128-pt4.patch, gnu/packages/patches/libtiff-CVE-2014-8128-pt5.patch, gnu/packages/patches/libtiff-CVE-2014-8129.patch, gnu/packages/patches/libtiff-CVE-2014-9330.patch, gnu/packages/patches/libtiff-CVE-2014-9655.patch: New files. * gnu-system.am (dist_patch_DATA): Add them. * gnu/packages/image.scm (libtiff)[source]: Add patches.
296 lines
11 KiB
Diff
296 lines
11 KiB
Diff
Copied from Debian
|
|
|
|
From 662f74445b2fea2eeb759c6524661118aef567ca Mon Sep 17 00:00:00 2001
|
|
From: erouault <erouault>
|
|
Date: Sun, 21 Dec 2014 15:15:31 +0000
|
|
Subject: [PATCH] Fix various crasher bugs on fuzzed images. *
|
|
libtiff/tif_dir.c: TIFFSetField(): refuse to set negative values for
|
|
TIFFTAG_XRESOLUTION and TIFFTAG_YRESOLUTION that cause asserts when writing
|
|
the directory * libtiff/tif_dirread.c: TIFFReadDirectory(): refuse to read
|
|
ColorMap or TransferFunction if BitsPerSample has not yet been read,
|
|
otherwise reading it later will cause user code to crash if BitsPerSample > 1
|
|
* libtiff/tif_getimage.c: TIFFRGBAImageOK(): return FALSE if LOGLUV with
|
|
SamplesPerPixel != 3, or if CIELAB with SamplesPerPixel != 3 or BitsPerSample
|
|
!= 8 * libtiff/tif_next.c: in the "run mode", use tilewidth for tiled images
|
|
instead of imagewidth to avoid crash * tools/bmp2tiff.c: fix crash due to int
|
|
overflow related to input BMP dimensions * tools/tiff2pdf.c: fix crash due to
|
|
invalid tile count (should likely be checked by libtiff too). Detect invalid
|
|
settings of BitsPerSample/SamplesPerPixel for CIELAB / ITULAB *
|
|
tools/tiffcrop.c: fix crash due to invalid TileWidth/TileHeight *
|
|
tools/tiffdump.c: fix crash due to overflow of entry count.
|
|
|
|
---
|
|
ChangeLog | 19 +++++++++++++++++++
|
|
libtiff/tif_dir.c | 21 +++++++++++++++++++--
|
|
libtiff/tif_dirread.c | 17 +++++++++++++++++
|
|
libtiff/tif_getimage.c | 15 +++++++++++++++
|
|
libtiff/tif_next.c | 2 ++
|
|
tools/bmp2tiff.c | 15 +++++++++++++++
|
|
tools/tiff2pdf.c | 41 +++++++++++++++++++++++++++++++++++++++++
|
|
tools/tiffcrop.c | 7 ++++---
|
|
tools/tiffdump.c | 9 ++++++---
|
|
9 files changed, 138 insertions(+), 8 deletions(-)
|
|
|
|
diff --git a/libtiff/tif_dir.c b/libtiff/tif_dir.c
|
|
index 98cf66d..ab43a28 100644
|
|
--- a/libtiff/tif_dir.c
|
|
+++ b/libtiff/tif_dir.c
|
|
@@ -160,6 +160,7 @@ _TIFFVSetField(TIFF* tif, uint32 tag, va_list ap)
|
|
TIFFDirectory* td = &tif->tif_dir;
|
|
int status = 1;
|
|
uint32 v32, i, v;
|
|
+ double dblval;
|
|
char* s;
|
|
const TIFFField *fip = TIFFFindField(tif, tag, TIFF_ANY);
|
|
uint32 standard_tag = tag;
|
|
@@ -284,10 +285,16 @@ _TIFFVSetField(TIFF* tif, uint32 tag, va_list ap)
|
|
setDoubleArrayOneValue(&td->td_smaxsamplevalue, va_arg(ap, double), td->td_samplesperpixel);
|
|
break;
|
|
case TIFFTAG_XRESOLUTION:
|
|
- td->td_xresolution = (float) va_arg(ap, double);
|
|
+ dblval = va_arg(ap, double);
|
|
+ if( dblval < 0 )
|
|
+ goto badvaluedouble;
|
|
+ td->td_xresolution = (float) dblval;
|
|
break;
|
|
case TIFFTAG_YRESOLUTION:
|
|
- td->td_yresolution = (float) va_arg(ap, double);
|
|
+ dblval = va_arg(ap, double);
|
|
+ if( dblval < 0 )
|
|
+ goto badvaluedouble;
|
|
+ td->td_yresolution = (float) dblval;
|
|
break;
|
|
case TIFFTAG_PLANARCONFIG:
|
|
v = (uint16) va_arg(ap, uint16_vap);
|
|
@@ -694,6 +701,16 @@ _TIFFVSetField(TIFF* tif, uint32 tag, va_list ap)
|
|
va_end(ap);
|
|
}
|
|
return (0);
|
|
+badvaluedouble:
|
|
+ {
|
|
+ const TIFFField* fip=TIFFFieldWithTag(tif,tag);
|
|
+ TIFFErrorExt(tif->tif_clientdata, module,
|
|
+ "%s: Bad value %f for \"%s\" tag",
|
|
+ tif->tif_name, dblval,
|
|
+ fip ? fip->field_name : "Unknown");
|
|
+ va_end(ap);
|
|
+ }
|
|
+ return (0);
|
|
}
|
|
|
|
/*
|
|
diff --git a/libtiff/tif_dirread.c b/libtiff/tif_dirread.c
|
|
index 391c823..f66c9a7 100644
|
|
--- a/libtiff/tif_dirread.c
|
|
+++ b/libtiff/tif_dirread.c
|
|
@@ -3430,6 +3430,8 @@ TIFFReadDirectory(TIFF* tif)
|
|
const TIFFField* fip;
|
|
uint32 fii=FAILED_FII;
|
|
toff_t nextdiroff;
|
|
+ int bitspersample_read = FALSE;
|
|
+
|
|
tif->tif_diroff=tif->tif_nextdiroff;
|
|
if (!TIFFCheckDirOffset(tif,tif->tif_nextdiroff))
|
|
return 0; /* last offset or bad offset (IFD looping) */
|
|
@@ -3706,6 +3708,8 @@ TIFFReadDirectory(TIFF* tif)
|
|
}
|
|
if (!TIFFSetField(tif,dp->tdir_tag,value))
|
|
goto bad;
|
|
+ if( dp->tdir_tag == TIFFTAG_BITSPERSAMPLE )
|
|
+ bitspersample_read = TRUE;
|
|
}
|
|
break;
|
|
case TIFFTAG_SMINSAMPLEVALUE:
|
|
@@ -3763,6 +3767,19 @@ TIFFReadDirectory(TIFF* tif)
|
|
uint32 countrequired;
|
|
uint32 incrementpersample;
|
|
uint16* value=NULL;
|
|
+ /* It would be dangerous to instanciate those tag values */
|
|
+ /* since if td_bitspersample has not yet been read (due to */
|
|
+ /* unordered tags), it could be read afterwards with a */
|
|
+ /* values greater than the default one (1), which may cause */
|
|
+ /* crashes in user code */
|
|
+ if( !bitspersample_read )
|
|
+ {
|
|
+ fip = TIFFFieldWithTag(tif,dp->tdir_tag);
|
|
+ TIFFWarningExt(tif->tif_clientdata,module,
|
|
+ "Ignoring %s since BitsPerSample tag not found",
|
|
+ fip ? fip->field_name : "unknown tagname");
|
|
+ continue;
|
|
+ }
|
|
countpersample=(1L<<tif->tif_dir.td_bitspersample);
|
|
if ((dp->tdir_tag==TIFFTAG_TRANSFERFUNCTION)&&(dp->tdir_count==(uint64)countpersample))
|
|
{
|
|
diff --git a/libtiff/tif_getimage.c b/libtiff/tif_getimage.c
|
|
index 074d32a..396ad08 100644
|
|
--- a/libtiff/tif_getimage.c
|
|
+++ b/libtiff/tif_getimage.c
|
|
@@ -182,8 +182,23 @@ TIFFRGBAImageOK(TIFF* tif, char emsg[1024])
|
|
"Planarconfiguration", td->td_planarconfig);
|
|
return (0);
|
|
}
|
|
+ if( td->td_samplesperpixel != 3 )
|
|
+ {
|
|
+ sprintf(emsg,
|
|
+ "Sorry, can not handle image with %s=%d",
|
|
+ "Samples/pixel", td->td_samplesperpixel);
|
|
+ return 0;
|
|
+ }
|
|
break;
|
|
case PHOTOMETRIC_CIELAB:
|
|
+ if( td->td_samplesperpixel != 3 || td->td_bitspersample != 8 )
|
|
+ {
|
|
+ sprintf(emsg,
|
|
+ "Sorry, can not handle image with %s=%d and %s=%d",
|
|
+ "Samples/pixel", td->td_samplesperpixel,
|
|
+ "Bits/sample", td->td_bitspersample);
|
|
+ return 0;
|
|
+ }
|
|
break;
|
|
default:
|
|
sprintf(emsg, "Sorry, can not handle image with %s=%d",
|
|
diff --git a/libtiff/tif_next.c b/libtiff/tif_next.c
|
|
index 55e2537..a53c716 100644
|
|
--- a/libtiff/tif_next.c
|
|
+++ b/libtiff/tif_next.c
|
|
@@ -102,6 +102,8 @@ NeXTDecode(TIFF* tif, uint8* buf, tmsize_t occ, uint16 s)
|
|
default: {
|
|
uint32 npixels = 0, grey;
|
|
uint32 imagewidth = tif->tif_dir.td_imagewidth;
|
|
+ if( isTiled(tif) )
|
|
+ imagewidth = tif->tif_dir.td_tilewidth;
|
|
|
|
/*
|
|
* The scanline is composed of a sequence of constant
|
|
diff --git a/tools/tiff2pdf.c b/tools/tiff2pdf.c
|
|
index dfda963..f202b41 100644
|
|
--- a/tools/tiff2pdf.c
|
|
+++ b/tools/tiff2pdf.c
|
|
@@ -1167,6 +1167,15 @@ void t2p_read_tiff_init(T2P* t2p, TIFF* input){
|
|
if( (TIFFGetField(input, TIFFTAG_PLANARCONFIG, &xuint16) != 0)
|
|
&& (xuint16 == PLANARCONFIG_SEPARATE ) ){
|
|
TIFFGetField(input, TIFFTAG_SAMPLESPERPIXEL, &xuint16);
|
|
+ if( (t2p->tiff_tiles[i].tiles_tilecount % xuint16) != 0 )
|
|
+ {
|
|
+ TIFFError(
|
|
+ TIFF2PDF_MODULE,
|
|
+ "Invalid tile count, %s",
|
|
+ TIFFFileName(input));
|
|
+ t2p->t2p_error = T2P_ERR_ERROR;
|
|
+ return;
|
|
+ }
|
|
t2p->tiff_tiles[i].tiles_tilecount/= xuint16;
|
|
}
|
|
if( t2p->tiff_tiles[i].tiles_tilecount > 0){
|
|
@@ -1552,6 +1561,22 @@ void t2p_read_tiff_data(T2P* t2p, TIFF* input){
|
|
#endif
|
|
break;
|
|
case PHOTOMETRIC_CIELAB:
|
|
+ if( t2p->tiff_samplesperpixel != 3){
|
|
+ TIFFError(
|
|
+ TIFF2PDF_MODULE,
|
|
+ "Unsupported samplesperpixel = %d for CIELAB",
|
|
+ t2p->tiff_samplesperpixel);
|
|
+ t2p->t2p_error = T2P_ERR_ERROR;
|
|
+ return;
|
|
+ }
|
|
+ if( t2p->tiff_bitspersample != 8){
|
|
+ TIFFError(
|
|
+ TIFF2PDF_MODULE,
|
|
+ "Invalid bitspersample = %d for CIELAB",
|
|
+ t2p->tiff_bitspersample);
|
|
+ t2p->t2p_error = T2P_ERR_ERROR;
|
|
+ return;
|
|
+ }
|
|
t2p->pdf_labrange[0]= -127;
|
|
t2p->pdf_labrange[1]= 127;
|
|
t2p->pdf_labrange[2]= -127;
|
|
@@ -1567,6 +1592,22 @@ void t2p_read_tiff_data(T2P* t2p, TIFF* input){
|
|
t2p->pdf_colorspace=T2P_CS_LAB;
|
|
break;
|
|
case PHOTOMETRIC_ITULAB:
|
|
+ if( t2p->tiff_samplesperpixel != 3){
|
|
+ TIFFError(
|
|
+ TIFF2PDF_MODULE,
|
|
+ "Unsupported samplesperpixel = %d for ITULAB",
|
|
+ t2p->tiff_samplesperpixel);
|
|
+ t2p->t2p_error = T2P_ERR_ERROR;
|
|
+ return;
|
|
+ }
|
|
+ if( t2p->tiff_bitspersample != 8){
|
|
+ TIFFError(
|
|
+ TIFF2PDF_MODULE,
|
|
+ "Invalid bitspersample = %d for ITULAB",
|
|
+ t2p->tiff_bitspersample);
|
|
+ t2p->t2p_error = T2P_ERR_ERROR;
|
|
+ return;
|
|
+ }
|
|
t2p->pdf_labrange[0]=-85;
|
|
t2p->pdf_labrange[1]=85;
|
|
t2p->pdf_labrange[2]=-75;
|
|
diff --git a/tools/tiffcrop.c b/tools/tiffcrop.c
|
|
index f5530bb..4088463 100644
|
|
--- a/tools/tiffcrop.c
|
|
+++ b/tools/tiffcrop.c
|
|
@@ -1205,9 +1205,10 @@ static int writeBufferToContigTiles (TIFF* out, uint8* buf, uint32 imagelength,
|
|
tsize_t tilesize = TIFFTileSize(out);
|
|
unsigned char *tilebuf = NULL;
|
|
|
|
- TIFFGetField(out, TIFFTAG_TILELENGTH, &tl);
|
|
- TIFFGetField(out, TIFFTAG_TILEWIDTH, &tw);
|
|
- TIFFGetField(out, TIFFTAG_BITSPERSAMPLE, &bps);
|
|
+ if( !TIFFGetField(out, TIFFTAG_TILELENGTH, &tl) ||
|
|
+ !TIFFGetField(out, TIFFTAG_TILEWIDTH, &tw) ||
|
|
+ !TIFFGetField(out, TIFFTAG_BITSPERSAMPLE, &bps) )
|
|
+ return 1;
|
|
|
|
tile_buffsize = tilesize;
|
|
if (tilesize < (tsize_t)(tl * tile_rowsize))
|
|
diff --git a/tools/tiffdump.c b/tools/tiffdump.c
|
|
index cf5d62f..8247765 100644
|
|
--- a/tools/tiffdump.c
|
|
+++ b/tools/tiffdump.c
|
|
@@ -374,6 +374,8 @@ ReadDirectory(int fd, unsigned int ix, uint64 off)
|
|
void* datamem;
|
|
uint64 dataoffset;
|
|
int datatruncated;
|
|
+ int datasizeoverflow;
|
|
+
|
|
tag = *(uint16*)dp;
|
|
if (swabflag)
|
|
TIFFSwabShort(&tag);
|
|
@@ -412,13 +414,14 @@ ReadDirectory(int fd, unsigned int ix, uint64 off)
|
|
else
|
|
typewidth = datawidth[type];
|
|
datasize = count*typewidth;
|
|
+ datasizeoverflow = (typewidth > 0 && datasize / typewidth != count);
|
|
datafits = 1;
|
|
datamem = dp;
|
|
dataoffset = 0;
|
|
datatruncated = 0;
|
|
if (!bigtiff)
|
|
{
|
|
- if (datasize>4)
|
|
+ if (datasizeoverflow || datasize>4)
|
|
{
|
|
uint32 dataoffset32;
|
|
datafits = 0;
|
|
@@ -432,7 +435,7 @@ ReadDirectory(int fd, unsigned int ix, uint64 off)
|
|
}
|
|
else
|
|
{
|
|
- if (datasize>8)
|
|
+ if (datasizeoverflow || datasize>8)
|
|
{
|
|
datafits = 0;
|
|
datamem = NULL;
|
|
@@ -442,7 +445,7 @@ ReadDirectory(int fd, unsigned int ix, uint64 off)
|
|
}
|
|
dp += sizeof(uint64);
|
|
}
|
|
- if (datasize>0x10000)
|
|
+ if (datasizeoverflow || datasize>0x10000)
|
|
{
|
|
datatruncated = 1;
|
|
count = 0x10000/typewidth;
|