* gnu/packages/patches/libtiff-CVE-2016-10092.patch, gnu/packages/patches/libtiff-CVE-2016-10093.patch, gnu/packages/patches/libtiff-CVE-2016-10094.patch, gnu/packages/patches/libtiff-assertion-failure.patch, gnu/packages/patches/libtiff-divide-by-zero-ojpeg.patch, gnu/packages/patches/libtiff-divide-by-zero-tiffcp.patch, gnu/packages/patches/libtiff-divide-by-zero-tiffcrop.patch, gnu/packages/patches/libtiff-divide-by-zero.patch, gnu/packages/patches/libtiff-heap-overflow-pixarlog-luv.patch, gnu/packages/patches/libtiff-heap-overflow-tif-dirread.patch, gnu/packages/patches/libtiff-heap-overflow-tiffcp.patch, gnu/packages/patches/libtiff-heap-overflow-tiffcrop.patch, gnu/packages/patches/libtiff-invalid-read.patch, gnu/packages/patches/libtiff-null-dereference.patch, gnu/packages/patches/libtiff-tiffcp-underflow.patch: New files. * gnu/local.mk (dist_patch_DATA): Add them. * gnu/packages/image.scm (libtiff)[replacement]: New field. (libtiff/fixed): New variable.
		
			
				
	
	
		
			63 lines
		
	
	
	
		
			2 KiB
		
	
	
	
		
			Diff
		
	
	
	
	
	
			
		
		
	
	
			63 lines
		
	
	
	
		
			2 KiB
		
	
	
	
		
			Diff
		
	
	
	
	
	
Fix divide-by-zero in OJPEGDecodeRaw():
 | 
						|
 | 
						|
http://bugzilla.maptools.org/show_bug.cgi?id=2611
 | 
						|
 | 
						|
2016-12-03 Even Rouault <even.rouault at spatialys.com>
 | 
						|
 | 
						|
        * libtiff/tif_ojpeg.c: make OJPEGDecode() early exit in case of failure
 | 
						|
in
 | 
						|
        OJPEGPreDecode(). This will avoid a divide by zero, and potential other
 | 
						|
issues.
 | 
						|
        Reported by Agostino Sarubbo.
 | 
						|
        Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2611
 | 
						|
 | 
						|
/cvs/maptools/cvsroot/libtiff/ChangeLog,v  <--  ChangeLog
 | 
						|
new revision: 1.1177; previous revision: 1.1176
 | 
						|
/cvs/maptools/cvsroot/libtiff/libtiff/tif_ojpeg.c,v  <--  libtiff/tif_ojpeg.c
 | 
						|
new revision: 1.66; previous revision: 1.65
 | 
						|
 | 
						|
Index: libtiff/libtiff/tif_ojpeg.c
 | 
						|
===================================================================
 | 
						|
RCS file: /cvs/maptools/cvsroot/libtiff/libtiff/tif_ojpeg.c,v
 | 
						|
retrieving revision 1.65
 | 
						|
retrieving revision 1.66
 | 
						|
diff -u -r1.65 -r1.66
 | 
						|
--- libtiff/libtiff/tif_ojpeg.c	4 Sep 2016 21:32:56 -0000	1.65
 | 
						|
+++ libtiff/libtiff/tif_ojpeg.c	3 Dec 2016 11:15:18 -0000	1.66
 | 
						|
@@ -1,4 +1,4 @@
 | 
						|
-/* $Id: tif_ojpeg.c,v 1.65 2016-09-04 21:32:56 erouault Exp $ */
 | 
						|
+/* $Id: tif_ojpeg.c,v 1.66 2016-12-03 11:15:18 erouault Exp $ */
 | 
						|
 
 | 
						|
 /* WARNING: The type of JPEG encapsulation defined by the TIFF Version 6.0
 | 
						|
    specification is now totally obsolete and deprecated for new applications and
 | 
						|
@@ -244,6 +244,7 @@
 | 
						|
 
 | 
						|
 typedef struct {
 | 
						|
 	TIFF* tif;
 | 
						|
+        int decoder_ok;
 | 
						|
 	#ifndef LIBJPEG_ENCAP_EXTERNAL
 | 
						|
 	JMP_BUF exit_jmpbuf;
 | 
						|
 	#endif
 | 
						|
@@ -722,6 +723,7 @@
 | 
						|
 		}
 | 
						|
 		sp->write_curstrile++;
 | 
						|
 	}
 | 
						|
+	sp->decoder_ok = 1;
 | 
						|
 	return(1);
 | 
						|
 }
 | 
						|
 
 | 
						|
@@ -784,8 +786,14 @@
 | 
						|
 static int
 | 
						|
 OJPEGDecode(TIFF* tif, uint8* buf, tmsize_t cc, uint16 s)
 | 
						|
 {
 | 
						|
+        static const char module[]="OJPEGDecode";
 | 
						|
 	OJPEGState* sp=(OJPEGState*)tif->tif_data;
 | 
						|
 	(void)s;
 | 
						|
+        if( !sp->decoder_ok )
 | 
						|
+        {
 | 
						|
+            TIFFErrorExt(tif->tif_clientdata,module,"Cannot decode: decoder not correctly initialized");
 | 
						|
+            return 0;
 | 
						|
+        }
 | 
						|
 	if (sp->libjpeg_jpeg_query_style==0)
 | 
						|
 	{
 | 
						|
 		if (OJPEGDecodeRaw(tif,buf,cc)==0)
 |