It would be quite helpful to me if in the future you would send multiple
patches to the same recipe as a patch series rather than individually.

That way I won't have to try to figure out which order you intended them to
be applied!

Steve

On Tue, Jul 25, 2023 at 8:09 PM Hitendra Prajapati <[email protected]>
wrote:

> Backport fixes for:
> * CVE-2023-25433 - Upstream-Status: Backport from
> https://gitlab.com/libtiff/libtiff/-/commit/9c22495e5eeeae9e00a1596720c969656bb8d678
> &&
> https://gitlab.com/libtiff/libtiff/-/commit/688012dca2c39033aa2dc7bcea9796787cfd1b44
> * CVE-2023-25434 & CVE-2023-25435 - Upstream-Status: Backport from
> https://gitlab.com/libtiff/libtiff/-/commit/69818e2f2d246e6631ac2a2da692c3706b849c38
>
> Signed-off-by: Hitendra Prajapati <[email protected]>
> ---
>  .../libtiff/tiff/CVE-2023-25433.patch         | 195 ++++++++++++++++++
>  .../tiff/CVE-2023-25434-CVE-2023-25435.patch  |  94 +++++++++
>  meta/recipes-multimedia/libtiff/tiff_4.3.0.bb |   2 +
>  3 files changed, 291 insertions(+)
>  create mode 100644
> meta/recipes-multimedia/libtiff/tiff/CVE-2023-25433.patch
>  create mode 100644
> meta/recipes-multimedia/libtiff/tiff/CVE-2023-25434-CVE-2023-25435.patch
>
> diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2023-25433.patch
> b/meta/recipes-multimedia/libtiff/tiff/CVE-2023-25433.patch
> new file mode 100644
> index 0000000000..285aa3d1c4
> --- /dev/null
> +++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2023-25433.patch
> @@ -0,0 +1,195 @@
> +From 9c22495e5eeeae9e00a1596720c969656bb8d678 Mon Sep 17 00:00:00 2001
> +From: Su_Laus <[email protected]>
> +Date: Fri, 3 Feb 2023 15:31:31 +0100
> +Subject: [PATCH] CVE-2023-25433
> +
> +tiffcrop correctly update buffersize after rotateImage()
> +fix#520 rotateImage() set up a new buffer and calculates its size
> +individually. Therefore, seg_buffs[] size needs to be updated accordingly.
> +Before this fix, the seg_buffs buffer size was calculated with a different
> +formula than within rotateImage().
> +
> +Closes #520.
> +
> +Upstream-Status: Backport [
> https://gitlab.com/libtiff/libtiff/-/commit/9c22495e5eeeae9e00a1596720c969656bb8d678
> &&
> https://gitlab.com/libtiff/libtiff/-/commit/688012dca2c39033aa2dc7bcea9796787cfd1b44
> ]
> +CVE: CVE-2023-25433
> +Signed-off-by: Hitendra Prajapati <[email protected]>
> +---
> + tools/tiffcrop.c | 78 +++++++++++++++++++++++++++++++++++++-----------
> + 1 file changed, 60 insertions(+), 18 deletions(-)
> +
> +diff --git a/tools/tiffcrop.c b/tools/tiffcrop.c
> +index eee26bf..cbd24cc 100644
> +--- a/tools/tiffcrop.c
> ++++ b/tools/tiffcrop.c
> +@@ -523,7 +523,7 @@ static int rotateContigSamples24bits(uint16_t,
> uint16_t, uint16_t, uint32_t,
> + static int rotateContigSamples32bits(uint16_t, uint16_t, uint16_t,
> uint32_t,
> +                                      uint32_t, uint32_t, uint8_t *,
> uint8_t *);
> + static int rotateImage(uint16_t, struct image_data *, uint32_t *,
> uint32_t *,
> +-                       unsigned char **, int);
> ++                       unsigned char **, size_t *);
> + static int mirrorImage(uint16_t, uint16_t, uint16_t, uint32_t, uint32_t,
> +                        unsigned char *);
> + static int invertImage(uint16_t, uint16_t, uint16_t, uint32_t, uint32_t,
> +@@ -6515,7 +6515,7 @@ static int  correct_orientation(struct image_data
> *image, unsigned char **work_b
> +        * but switch xres, yres there. */
> +       uint32_t width = image->width;
> +       uint32_t length = image->length;
> +-      if (rotateImage(rotation, image, &width, &length, work_buff_ptr,
> TRUE))
> ++      if (rotateImage(rotation, image, &width, &length, work_buff_ptr,
> NULL))
> +       {
> +       TIFFError ("correct_orientation", "Unable to rotate image");
> +       return (-1);
> +@@ -7695,16 +7695,19 @@ processCropSelections(struct image_data *image,
> struct crop_mask *crop,
> +
> +     if (crop->crop_mode & CROP_ROTATE) /* rotate should be last as it
> can reallocate the buffer */
> +       {
> ++        /* rotateImage() set up a new buffer and calculates its size
> ++         * individually. Therefore, seg_buffs size  needs to be updated
> ++         * accordingly. */
> ++      size_t rot_buf_size = 0;
> +       if (rotateImage(crop->rotation, image, &crop->combined_width,
> +-                      &crop->combined_length, &crop_buff, FALSE))
> ++                      &crop->combined_length, &crop_buff, &rot_buf_size))
> +         {
> +         TIFFError("processCropSelections",
> +                   "Failed to rotate composite regions by %"PRIu32"
> degrees", crop->rotation);
> +         return (-1);
> +         }
> +       seg_buffs[0].buffer = crop_buff;
> +-      seg_buffs[0].size = (((crop->combined_width * image->bps + 7 ) / 8)
> +-                            * image->spp) * crop->combined_length;
> ++      seg_buffs[0].size = rot_buf_size;
> +       }
> +     }
> +   else  /* Separated Images */
> +@@ -7804,9 +7807,13 @@ processCropSelections(struct image_data *image,
> struct crop_mask *crop,
> +         {
> +           /* rotateImage() changes image->width, ->length, ->xres and
> ->yres, what it schouldn't do here, when more than one section is
> processed.
> +            * ToDo: Therefore rotateImage() and its usage has to be
> reworked (e.g. like mirrorImage()) !!
> +-           */
> +-      if (rotateImage(crop->rotation, image, &crop->regionlist[i].width,
> +-                      &crop->regionlist[i].length, &crop_buff, FALSE))
> ++           * Furthermore, rotateImage() set up a new buffer and
> calculates
> ++           * its size individually. Therefore, seg_buffs size  needs to
> be
> ++           * updated accordingly. */
> ++         size_t rot_buf_size = 0;
> ++           if (rotateImage(
> ++                crop->rotation, image, &crop->regionlist[i].width,
> ++                &crop->regionlist[i].length, &crop_buff, &rot_buf_size))
> +           {
> +           TIFFError("processCropSelections",
> +                     "Failed to rotate crop region by %"PRIu16" degrees",
> crop->rotation);
> +@@ -7817,8 +7824,7 @@ processCropSelections(struct image_data *image,
> struct crop_mask *crop,
> +         crop->combined_width = total_width;
> +         crop->combined_length = total_length;
> +         seg_buffs[i].buffer = crop_buff;
> +-        seg_buffs[i].size = (((crop->regionlist[i].width * image->bps +
> 7 ) / 8)
> +-                               * image->spp) *
> crop->regionlist[i].length;
> ++        seg_buffs[i].size = rot_buf_size;
> +         }
> +       }  /* for crop->selections loop */
> +     }  /* Separated Images (else case) */
> +@@ -7827,7 +7833,6 @@ processCropSelections(struct image_data *image,
> struct crop_mask *crop,
> +
> + /* Copy the crop section of the data from the current image into a buffer
> +  * and adjust the IFD values to reflect the new size. If no cropping is
> +- * required, use the original read buffer as the crop buffer.
> +  *
> +  * There is quite a bit of redundancy between this routine and the more
> +  * specialized processCropSelections, but this provides
> +@@ -7938,7 +7943,7 @@ createCroppedImage(struct image_data *image, struct
> crop_mask *crop,
> +   if (crop->crop_mode & CROP_ROTATE) /* rotate should be last as it can
> reallocate the buffer */
> +     {
> +     if (rotateImage(crop->rotation, image, &crop->combined_width,
> +-                    &crop->combined_length, crop_buff_ptr, TRUE))
> ++                    &crop->combined_length, crop_buff_ptr, NULL))
> +       {
> +       TIFFError("createCroppedImage",
> +                 "Failed to rotate image or cropped selection by
> %"PRIu16" degrees", crop->rotation);
> +@@ -8600,14 +8605,16 @@ rotateContigSamples32bits(uint16_t rotation,
> uint16_t spp, uint16_t bps, uint32_
> +
> + /* Rotate an image by a multiple of 90 degrees clockwise */
> + static int
> +-rotateImage(uint16_t rotation, struct image_data *image, uint32_t
> *img_width,
> +-            uint32_t *img_length, unsigned char **ibuff_ptr, int
> rot_image_params)
> ++rotateImage(uint16_t rotation, struct image_data *image,
> ++            uint32_t *img_width,uint32_t *img_length,
> ++            unsigned char **ibuff_ptr, size_t *rot_buf_size)
> +   {
> +   int      shift_width;
> +   uint32_t   bytes_per_pixel, bytes_per_sample;
> +   uint32_t   row, rowsize, src_offset, dst_offset;
> +   uint32_t   i, col, width, length;
> +-  uint32_t   colsize, buffsize, col_offset, pix_offset;
> ++  uint32_t colsize, col_offset, pix_offset;
> ++  tmsize_t buffsize;
> +   unsigned char *ibuff;
> +   unsigned char *src;
> +   unsigned char *dst;
> +@@ -8620,12 +8627,41 @@ rotateImage(uint16_t rotation, struct image_data
> *image, uint32_t *img_width,
> +   spp = image->spp;
> +   bps = image->bps;
> +
> ++  if ((spp != 0 && bps != 0 &&
> ++         width > (uint32_t)((UINT32_MAX - 7) / spp / bps)) ||
> ++        (spp != 0 && bps != 0 &&
> ++         length > (uint32_t)((UINT32_MAX - 7) / spp / bps)))
> ++    {
> ++        TIFFError("rotateImage", "Integer overflow detected.");
> ++        return (-1);
> ++    }
> ++
> +   rowsize = ((bps * spp * width) + 7) / 8;
> +   colsize = ((bps * spp * length) + 7) / 8;
> +   if ((colsize * width) > (rowsize * length))
> +-    buffsize = (colsize + 1) * width;
> ++{
> ++        if (((tmsize_t)colsize + 1) != 0 &&
> ++            (tmsize_t)width > ((TIFF_TMSIZE_T_MAX -
> NUM_BUFF_OVERSIZE_BYTES) /
> ++                               ((tmsize_t)colsize + 1)))
> ++        {
> ++            TIFFError("rotateImage",
> ++                      "Integer overflow when calculating buffer size.");
> ++            return (-1);
> ++        }
> ++        buffsize = ((tmsize_t)colsize + 1) * width;
> ++    }
> +   else
> +-    buffsize = (rowsize + 1) * length;
> ++    {
> ++        if (((tmsize_t)rowsize + 1) != 0 &&
> ++            (tmsize_t)length > ((TIFF_TMSIZE_T_MAX -
> NUM_BUFF_OVERSIZE_BYTES) /
> ++                                ((tmsize_t)rowsize + 1)))
> ++        {
> ++            TIFFError("rotateImage",
> ++                      "Integer overflow when calculating buffer size.");
> ++            return (-1);
> ++        }
> ++        buffsize = (rowsize + 1) * length;
> ++    }
> +
> +   bytes_per_sample = (bps + 7) / 8;
> +   bytes_per_pixel  = ((bps * spp) + 7) / 8;
> +@@ -8648,11 +8684,17 @@ rotateImage(uint16_t rotation, struct image_data
> *image, uint32_t *img_width,
> +   /* Add 3 padding bytes for extractContigSamplesShifted32bits */
> +   if (!(rbuff = (unsigned char *)limitMalloc(buffsize +
> NUM_BUFF_OVERSIZE_BYTES)))
> +     {
> +-    TIFFError("rotateImage", "Unable to allocate rotation buffer of %1u
> bytes", buffsize + NUM_BUFF_OVERSIZE_BYTES);
> ++    TIFFError("rotateImage",
> ++              "Unable to allocate rotation buffer of %" TIFF_SSIZE_FORMAT
> ++              " bytes ",
> ++              buffsize + NUM_BUFF_OVERSIZE_BYTES);
> +     return (-1);
> +     }
> +   _TIFFmemset(rbuff, '\0', buffsize + NUM_BUFF_OVERSIZE_BYTES);
> +
> ++  if (rot_buf_size != NULL)
> ++      *rot_buf_size = buffsize;
> ++
> +   ibuff = *ibuff_ptr;
> +   switch (rotation)
> +     {
> +--
> +2.25.1
> +
> diff --git
> a/meta/recipes-multimedia/libtiff/tiff/CVE-2023-25434-CVE-2023-25435.patch
> b/meta/recipes-multimedia/libtiff/tiff/CVE-2023-25434-CVE-2023-25435.patch
> new file mode 100644
> index 0000000000..e214277504
> --- /dev/null
> +++
> b/meta/recipes-multimedia/libtiff/tiff/CVE-2023-25434-CVE-2023-25435.patch
> @@ -0,0 +1,94 @@
> +From 69818e2f2d246e6631ac2a2da692c3706b849c38 Mon Sep 17 00:00:00 2001
> +From: Su_Laus <[email protected]>
> +Date: Sun, 29 Jan 2023 11:09:26 +0100
> +Subject: [PATCH] CVE-2023-25434 & CVE-2023-25435
> +
> +tiffcrop: Amend rotateImage() not to toggle the input (main)
> +image width and length parameters when only cropped image sections are
> +rotated. Remove buffptr from region structure because never used.
> +
> +Closes #492 #493 #494 #495 #499 #518 #519
> +
> +Upstream-Status: Backport [
> https://gitlab.com/libtiff/libtiff/-/commit/69818e2f2d246e6631ac2a2da692c3706b849c38
> ]
> +CVE: CVE-2023-25434 & CVE-2023-25435
> +Signed-off-by: Hitendra Prajapati <[email protected]>
> +---
> + tools/tiffcrop.c | 27 ++++++++++++++++-----------
> + 1 file changed, 16 insertions(+), 11 deletions(-)
> +
> +diff --git a/tools/tiffcrop.c b/tools/tiffcrop.c
> +index cbd24cc..b811fbb 100644
> +--- a/tools/tiffcrop.c
> ++++ b/tools/tiffcrop.c
> +@@ -523,7 +523,7 @@ static int rotateContigSamples24bits(uint16_t,
> uint16_t, uint16_t, uint32_t,
> + static int rotateContigSamples32bits(uint16_t, uint16_t, uint16_t,
> uint32_t,
> +                                      uint32_t, uint32_t, uint8_t *,
> uint8_t *);
> + static int rotateImage(uint16_t, struct image_data *, uint32_t *,
> uint32_t *,
> +-                       unsigned char **, size_t *);
> ++                       unsigned char **, size_t *, int);
> + static int mirrorImage(uint16_t, uint16_t, uint16_t, uint32_t, uint32_t,
> +                        unsigned char *);
> + static int invertImage(uint16_t, uint16_t, uint16_t, uint32_t, uint32_t,
> +@@ -6513,10 +6513,11 @@ static int  correct_orientation(struct image_data
> *image, unsigned char **work_b
> +       /* Dummy variable in order not to switch two times the
> +        * image->width,->length within rotateImage(),
> +        * but switch xres, yres there. */
> +-      uint32_t width = image->width;
> +-      uint32_t length = image->length;
> +-      if (rotateImage(rotation, image, &width, &length, work_buff_ptr,
> NULL))
> +-      {
> ++        uint32_t width = image->width;
> ++        uint32_t length = image->length;
> ++        if (rotateImage(rotation, image, &width, &length, work_buff_ptr,
> NULL,
> ++                        TRUE))
> ++        {
> +       TIFFError ("correct_orientation", "Unable to rotate image");
> +       return (-1);
> +       }
> +@@ -7700,7 +7701,8 @@ processCropSelections(struct image_data *image,
> struct crop_mask *crop,
> +          * accordingly. */
> +       size_t rot_buf_size = 0;
> +       if (rotateImage(crop->rotation, image, &crop->combined_width,
> +-                      &crop->combined_length, &crop_buff, &rot_buf_size))
> ++                      &crop->combined_length, &crop_buff, &rot_buf_size,
> ++                            FALSE))
> +         {
> +         TIFFError("processCropSelections",
> +                   "Failed to rotate composite regions by %"PRIu32"
> degrees", crop->rotation);
> +@@ -7811,9 +7813,10 @@ processCropSelections(struct image_data *image,
> struct crop_mask *crop,
> +            * its size individually. Therefore, seg_buffs size  needs to
> be
> +            * updated accordingly. */
> +          size_t rot_buf_size = 0;
> +-           if (rotateImage(
> +-                crop->rotation, image, &crop->regionlist[i].width,
> +-                &crop->regionlist[i].length, &crop_buff, &rot_buf_size))
> ++           if (rotateImage(crop->rotation, image,
> ++                                &crop->regionlist[i].width,
> ++                                &crop->regionlist[i].length, &crop_buff,
> ++                                &rot_buf_size, FALSE))
> +           {
> +           TIFFError("processCropSelections",
> +                     "Failed to rotate crop region by %"PRIu16" degrees",
> crop->rotation);
> +@@ -7943,7 +7946,7 @@ createCroppedImage(struct image_data *image, struct
> crop_mask *crop,
> +   if (crop->crop_mode & CROP_ROTATE) /* rotate should be last as it can
> reallocate the buffer */
> +     {
> +     if (rotateImage(crop->rotation, image, &crop->combined_width,
> +-                    &crop->combined_length, crop_buff_ptr, NULL))
> ++                    &crop->combined_length, crop_buff_ptr, NULL, TRUE))
> +       {
> +       TIFFError("createCroppedImage",
> +                 "Failed to rotate image or cropped selection by
> %"PRIu16" degrees", crop->rotation);
> +@@ -8607,7 +8610,9 @@ rotateContigSamples32bits(uint16_t rotation,
> uint16_t spp, uint16_t bps, uint32_
> + static int
> + rotateImage(uint16_t rotation, struct image_data *image,
> +             uint32_t *img_width,uint32_t *img_length,
> +-            unsigned char **ibuff_ptr, size_t *rot_buf_size)
> ++            unsigned char **ibuff_ptr, size_t *rot_buf_size,
> ++            int rot_image_params)
> ++
> +   {
> +   int      shift_width;
> +   uint32_t   bytes_per_pixel, bytes_per_sample;
> +--
> +2.25.1
> +
> diff --git a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
> b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
> index 2be25756bc..2ee10fca72 100644
> --- a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
> +++ b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
> @@ -35,6 +35,8 @@ SRC_URI = "
> http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \
>             file://CVE-2022-48281.patch \
>             file://CVE-2023-0800_0801_0802_0803_0804.patch \
>             file://CVE-2023-0795_0796_0797_0798_0799.patch \
> +           file://CVE-2023-25433.patch \
> +           file://CVE-2023-25434-CVE-2023-25435.patch \
>             "
>
>  SRC_URI[sha256sum] =
> "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8"
> --
> 2.25.1
>
>
> 
>
>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#184887): 
https://lists.openembedded.org/g/openembedded-core/message/184887
Mute This Topic: https://lists.openembedded.org/mt/100345399/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to