pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/graphics/tiff Fix CVE-2016-10266 ref.



details:   https://anonhg.NetBSD.org/pkgsrc/rev/78a4456e0ffa
branches:  trunk
changeset: 362177:78a4456e0ffa
user:      he <he%pkgsrc.org@localhost>
date:      Sun May 07 21:32:30 2017 +0000

description:
Fix CVE-2016-10266 ref.
http://bugzilla.maptools.org/show_bug.cgi?id=2596
https://github.com/vadz/libtiff/commit/438274f938e046d33cb0e1230b41da32ffe223e1
Bump PKGREVISION.

diffstat:

 graphics/tiff/Makefile                         |   4 ++--
 graphics/tiff/distinfo                         |   5 +++--
 graphics/tiff/patches/patch-libtiff_tif_read.c |  17 +++++++++++++++--
 graphics/tiff/patches/patch-libtiff_tiffiop.h  |  19 +++++++++++++++++++
 4 files changed, 39 insertions(+), 6 deletions(-)

diffs (90 lines):

diff -r 0896a98bed5d -r 78a4456e0ffa graphics/tiff/Makefile
--- a/graphics/tiff/Makefile    Sun May 07 21:21:01 2017 +0000
+++ b/graphics/tiff/Makefile    Sun May 07 21:32:30 2017 +0000
@@ -1,7 +1,7 @@
-# $NetBSD: Makefile,v 1.133 2017/05/06 21:37:16 he Exp $
+# $NetBSD: Makefile,v 1.134 2017/05/07 21:32:30 he Exp $
 
 DISTNAME=      tiff-4.0.7
-PKGREVISION=   9
+PKGREVISION=   10
 CATEGORIES=    graphics
 MASTER_SITES=  ftp://download.osgeo.org/libtiff/
 
diff -r 0896a98bed5d -r 78a4456e0ffa graphics/tiff/distinfo
--- a/graphics/tiff/distinfo    Sun May 07 21:21:01 2017 +0000
+++ b/graphics/tiff/distinfo    Sun May 07 21:32:30 2017 +0000
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.79 2017/05/06 21:37:16 he Exp $
+$NetBSD: distinfo,v 1.80 2017/05/07 21:32:30 he Exp $
 
 SHA1 (tiff-4.0.7.tar.gz) = 2c1b64478e88f93522a42dd5271214a0e5eae648
 RMD160 (tiff-4.0.7.tar.gz) = 582e19c31e7f29d9ed36995dcad7ad68802cbadb
@@ -15,10 +15,11 @@
 SHA1 (patch-libtiff_tif_getimage.c) = 267b555c8b043d0a835db4d46ef65131776601e6
 SHA1 (patch-libtiff_tif_jpeg.c) = 1049b7b243e9e145886bcac8e68e5e7889337ebc
 SHA1 (patch-libtiff_tif_ojpeg.c) = 6447168e952bb80a1a8272c2c27bb0ce3ccf6939
-SHA1 (patch-libtiff_tif_read.c) = 85674d2e222846e3971301ce2fb7ebe02f54b9b2
+SHA1 (patch-libtiff_tif_read.c) = d43b10fa74a51da21f44abb7bd0251b88e8a702b
 SHA1 (patch-libtiff_tif_unix.c) = c8312771e567f90de0f77ac8eb66ed5c36e35617
 SHA1 (patch-libtiff_tif_win32.c) = 1ea9dcb6618c40b9de3e8d2a81914355f2111fdc
 SHA1 (patch-libtiff_tiffio.h) = e0efa9e1246e07dbb3a69d626988a18f12ba9d3c
+SHA1 (patch-libtiff_tiffiop.h) = 1100e55483da58037fa3f4168fffdfcbc5407456
 SHA1 (patch-man_Makefile.in) = ff073529c9d3ab98a03efa7d98c3263c1782482f
 SHA1 (patch-tools_tiff2pdf.c) = ce7a3e77c27ad3cabaa33b5da61cbd1b27f187d1
 SHA1 (patch-tools_tiffcp.c) = bd6abd9dc6e044ff04d761d999fabfb0919ba0db
diff -r 0896a98bed5d -r 78a4456e0ffa graphics/tiff/patches/patch-libtiff_tif_read.c
--- a/graphics/tiff/patches/patch-libtiff_tif_read.c    Sun May 07 21:21:01 2017 +0000
+++ b/graphics/tiff/patches/patch-libtiff_tif_read.c    Sun May 07 21:32:30 2017 +0000
@@ -1,4 +1,4 @@
-$NetBSD: patch-libtiff_tif_read.c,v 1.1 2017/05/03 23:00:59 sevan Exp $
+$NetBSD: patch-libtiff_tif_read.c,v 1.2 2017/05/07 21:32:30 he Exp $
 
 CVE-2017-7593
 http://bugzilla.maptools.org/show_bug.cgi?id=2651
@@ -7,8 +7,21 @@
 CVE-2017-7602
 https://github.com/vadz/libtiff/commit/66e7bd59520996740e4df5495a830b42fae48bc4
 
---- libtiff/tif_read.c.orig    2017-05-03 22:31:30.000000000 +0000
+CVE-2016-10266
+http://bugzilla.maptools.org/show_bug.cgi?id=2596
+https://github.com/vadz/libtiff/commit/438274f938e046d33cb0e1230b41da32ffe223e1
+
+--- libtiff/tif_read.c.orig    2016-07-13 13:28:17.000000000 +0000
 +++ libtiff/tif_read.c
+@@ -346,7 +346,7 @@ TIFFReadEncodedStrip(TIFF* tif, uint32 s
+       rowsperstrip=td->td_rowsperstrip;
+       if (rowsperstrip>td->td_imagelength)
+               rowsperstrip=td->td_imagelength;
+-      stripsperplane=((td->td_imagelength+rowsperstrip-1)/rowsperstrip);
++      stripsperplane= TIFFhowmany_32_maxuint_compat(td->td_imagelength, rowsperstrip);
+       stripinplane=(strip%stripsperplane);
+       plane=(uint16)(strip/stripsperplane);
+       rows=td->td_imagelength-stripinplane*rowsperstrip;
 @@ -420,16 +420,25 @@ TIFFReadRawStrip1(TIFF* tif, uint32 stri
                        return ((tmsize_t)(-1));
                }
diff -r 0896a98bed5d -r 78a4456e0ffa graphics/tiff/patches/patch-libtiff_tiffiop.h
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/graphics/tiff/patches/patch-libtiff_tiffiop.h     Sun May 07 21:32:30 2017 +0000
@@ -0,0 +1,19 @@
+$NetBSD: patch-libtiff_tiffiop.h,v 1.3 2017/05/07 21:32:30 he Exp $
+
+CVE-2016-10266
+http://bugzilla.maptools.org/show_bug.cgi?id=2596
+https://github.com/vadz/libtiff/commit/438274f938e046d33cb0e1230b41da32ffe223e1
+
+--- libtiff/tiffiop.h.orig     2016-01-24 15:39:51.000000000 +0000
++++ libtiff/tiffiop.h
+@@ -250,6 +250,10 @@ struct tiff {
+ #define TIFFhowmany_32(x, y) (((uint32)x < (0xffffffff - (uint32)(y-1))) ? \
+                          ((((uint32)(x))+(((uint32)(y))-1))/((uint32)(y))) : \
+                          0U)
++/* Variant of TIFFhowmany_32() that doesn't return 0 if x close to MAXUINT. */
++/* Caution: TIFFhowmany_32_maxuint_compat(x,y)*y might overflow */
++#define TIFFhowmany_32_maxuint_compat(x, y) \
++                         (((uint32)(x) / (uint32)(y)) + ((((uint32)(x) % (uint32)(y)) != 0) ? 1 : 0))
+ #define TIFFhowmany8_32(x) (((x)&0x07)?((uint32)(x)>>3)+1:(uint32)(x)>>3)
+ #define TIFFroundup_32(x, y) (TIFFhowmany_32(x,y)*(y))
+ #define TIFFhowmany_64(x, y) ((((uint64)(x))+(((uint64)(y))-1))/((uint64)(y)))



Home | Main Index | Thread Index | Old Index