tiff: fix CVE-2025-8177

A vulnerability was found in LibTIFF up to 4.7.0. It has been
rated as critical. This issue affects the function setrow of the
file tools/thumbnail.c. The manipulation leads to buffer overflow.
An attack has to be approached locally. The patch is named
e8c9d6c616b19438695fd829e58ae4fde5bfbc22. It is recommended to
apply a patch to fix this issue. This vulnerability only affects
products that are no longer supported by the maintainer.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2025-8177

Upstream patch:
e8de4dc1f9

(From OE-Core rev: fbf3238630c104c9e17d6e902986358cea5986ff)

Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
This commit is contained in:
Yogita Urade
2025-08-06 17:54:13 +05:30
committed by Steve Sakoman
parent c2581b7811
commit dc468377e8
2 changed files with 36 additions and 0 deletions

View File

@@ -0,0 +1,35 @@
From e8de4dc1f923576dce9d625caeebd93f9db697e1 Mon Sep 17 00:00:00 2001
From: Lee Howard <faxguy@howardsilvan.com>
Date: Wed, 25 Jun 2025 17:14:18 +0000
Subject: [PATCH] Fix for thumbnail issue #715
CVE: CVE-2025-8177
Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/e8de4dc1f923576dce9d625caeebd93f9db697e1]
Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
---
tools/thumbnail.c | 8 ++++++++
1 file changed, 8 insertions(+)
diff --git a/tools/thumbnail.c b/tools/thumbnail.c
index 274705d..8960d36 100644
--- a/tools/thumbnail.c
+++ b/tools/thumbnail.c
@@ -538,7 +538,15 @@ setrow(uint8_t* row, uint32_t nrows, const uint8_t* rows[])
}
acc += bits[*src & mask1];
}
+ if (255 * acc / area < 256)
+ {
*row++ = cmap[(255*acc)/area];
+ }
+ else
+ {
+ fprintf(stderr, "acc=%d, area=%d\n", acc, area);
+ *row++ = cmap[0];
+ }
}
}
--
2.40.0

View File

@@ -58,6 +58,7 @@ SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \
file://CVE-2025-8176-0001.patch \
file://CVE-2025-8176-0002.patch \
file://CVE-2025-8176-0003.patch \
file://CVE-2025-8177.patch \
"
SRC_URI[sha256sum] = "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8"