1
0
forked from pool/wxWidgets-3_2

1 Commits

Author SHA256 Message Date
3e98252e49 Fix CVE-2025-8851 and CVE-2025-9165 2025-09-05 14:07:12 +08:00
4 changed files with 103 additions and 2 deletions

View File

@@ -1,3 +1,19 @@
-------------------------------------------------------------------
Mon Sep 1 17:28:12 UTC 2025 - Cliff Zhao <qzhao@suse.com>
- Add wxWidgets-3_2_CVE-2025-9165.patch:
Backport ed14128 from libtiff upstream, tiffcmp: fix memory leak
when second file cannot be opened.
(CVE-2025-9165, bsc#1248328)
-------------------------------------------------------------------
Mon Sep 1 10:07:46 UTC 2025 - Cliff Zhao <qzhao@suse.com>
- Add wxWidgets-3_2_CVE-2025-8851.patch:
Backport 8a7a48d from libtiff upstream, Attempt to address tiffcrop
Coverity scan issues 1605444.
(CVE-2025-8851, bsc#1248279)
-------------------------------------------------------------------
Thu May 29 17:11:39 UTC 2025 - Antonio Larrosa <alarrosa@suse.com>

View File

@@ -83,6 +83,8 @@ Source6: wxpython-mkdiff.sh
Patch0: soversion.diff
Patch1: autoconf-2_72.diff
Patch2: textfiletest-fix-file-exists.diff
Patch3: wxWidgets-3_2_CVE-2025-8851.patch
Patch4: wxWidgets-3_2_CVE-2025-9165.patch
%if "%flavor" == "doc"
BuildRequires: doxygen
BuildRequires: fdupes
@@ -401,8 +403,6 @@ WX_SKIP_DOXYGEN_VERSION_CHECK=1 ./regen.sh html
%else
autoconf -f -i
rm -Rf src/tiff
# NOTE: gnome-vfs is deprecated. Disabled by default upstream.
#
# With 2.9.1:

View File

@@ -0,0 +1,62 @@
From 8a7a48d7a645992ca83062b3a1873c951661e2b3 Mon Sep 17 00:00:00 2001
From: Lee Howard <faxguy@howardsilvan.com>
Date: Sun, 11 Aug 2024 16:01:07 +0000
Subject: [PATCH] Attempt to address tiffcrop Coverity scan issues 1605444,
1605445, and 1605449.
---
tools/tiffcrop.c | 17 ++++++++++++-----
1 file changed, 12 insertions(+), 5 deletions(-)
--- a/src/tiff/tools/tiffcrop.c
+++ b/src/tiff/tools/tiffcrop.c
@@ -4902,7 +4902,14 @@
buff = srcbuffs[s];
strip = (s * strips_per_sample) + j;
bytes_read = TIFFReadEncodedStrip (in, strip, buff, stripsize);
- rows_this_strip = bytes_read / src_rowsize;
+ if (bytes_read < 0)
+ {
+ rows_this_strip = 0;
+ }
+ else
+ {
+ rows_this_strip = bytes_read / src_rowsize;
+ }
if (bytes_read < 0 && !ignore)
{
TIFFError(TIFFFileName(in),
@@ -5276,14 +5283,14 @@
rmargin = (uint32)(crop->margins[3] * scale * xres);
}
- if ((lmargin + rmargin) > image->width)
+ if (lmargin == 0xFFFFFFFFU || rmargin == 0xFFFFFFFFU || (lmargin + rmargin) > image->width)
{
TIFFError("computeInputPixelOffsets", "Combined left and right margins exceed image width");
lmargin = (uint32) 0;
rmargin = (uint32) 0;
return (-1);
}
- if ((tmargin + bmargin) > image->length)
+ if (tmargin == 0xFFFFFFFFU || bmargin == 0xFFFFFFFFU || (tmargin + bmargin) > image->length)
{
TIFFError("computeInputPixelOffsets", "Combined top and bottom margins exceed image length");
tmargin = (uint32) 0;
@@ -5728,14 +5735,14 @@
vmargin = (uint32)(page->vmargin * scale * ((image->bps + 7)/ 8));
}
- if ((hmargin * 2.0) > (pwidth * page->hres))
+ if (hmargin == 0xFFFFFFFFU || (hmargin * 2.0) > (pwidth * page->hres))
{
TIFFError("computeOutputPixelOffsets",
"Combined left and right margins exceed page width");
hmargin = (uint32) 0;
return (-1);
}
- if ((vmargin * 2.0) > (plength * page->vres))
+ if (vmargin == 0xFFFFFFFFU || (vmargin * 2.0) > (plength * page->vres))
{
TIFFError("computeOutputPixelOffsets",
"Combined top and bottom margins exceed page length");

View File

@@ -0,0 +1,23 @@
From ed141286a37f6e5ddafb5069347ff5d587e7a4e0 Mon Sep 17 00:00:00 2001
From: Su_Laus <sulau@freenet.de>
Date: Fri, 8 Aug 2025 21:35:30 +0200
Subject: [PATCH] tiffcmp: fix memory leak when second file cannot be opened.
Closes #728, #729
---
tools/tiffcmp.c | 3 +++
1 file changed, 3 insertions(+)
--- a/src/tiff/tools/tiffcmp.c
+++ b/src/tiff/tools/tiffcmp.c
@@ -108,7 +108,10 @@
return (2);
tif2 = TIFFOpen(argv[optind+1], "r");
if (tif2 == NULL)
+ {
+ TIFFClose(tif1);
return (2);
+ }
dirnum = 0;
while (tiffcmp(tif1, tif2)) {
if (!TIFFReadDirectory(tif1)) {