diff -Nru tiff-4.4.0/debian/changelog tiff-4.4.0/debian/changelog --- tiff-4.4.0/debian/changelog 2022-11-02 09:43:19.000000000 +0100 +++ tiff-4.4.0/debian/changelog 2022-11-30 16:24:00.000000000 +0100 @@ -1,3 +1,10 @@ +tiff (4.4.0-4ubuntu3.2) kinetic-security; urgency=critical + + * Backport security fix for CVE-2022-3970, fix (unsigned) integer overflow + on strips/tiles > 2 GB in TIFFReadRGBATileExt() (closes: #1024737). + + -- Rico Tzschichholz Wed, 30 Nov 2022 16:24:00 +0100 + tiff (4.4.0-4ubuntu3.1) kinetic-security; urgency=medium * SECURITY UPDATE: heap-overflow and double free in tiffcrop diff -Nru tiff-4.4.0/debian/patches/CVE-2022-3970.patch tiff-4.4.0/debian/patches/CVE-2022-3970.patch --- tiff-4.4.0/debian/patches/CVE-2022-3970.patch 1970-01-01 01:00:00.000000000 +0100 +++ tiff-4.4.0/debian/patches/CVE-2022-3970.patch 2022-11-24 17:54:18.000000000 +0100 @@ -0,0 +1,38 @@ +From 227500897dfb07fb7d27f7aa570050e62617e3be Mon Sep 17 00:00:00 2001 +From: Even Rouault +Date: Tue, 8 Nov 2022 15:16:58 +0100 +Subject: [PATCH] TIFFReadRGBATileExt(): fix (unsigned) integer overflow on + strips/tiles > 2 GB + +Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53137 +--- + libtiff/tif_getimage.c | 8 ++++---- + 1 file changed, 4 insertions(+), 4 deletions(-) + +diff --git a/libtiff/tif_getimage.c b/libtiff/tif_getimage.c +index a4d0c1d6..60b94d8e 100644 +--- a/libtiff/tif_getimage.c ++++ b/libtiff/tif_getimage.c +@@ -3058,15 +3058,15 @@ TIFFReadRGBATileExt(TIFF* tif, uint32_t col, uint32_t row, uint32_t * raster, in + return( ok ); + + for( i_row = 0; i_row < read_ysize; i_row++ ) { +- memmove( raster + (tile_ysize - i_row - 1) * tile_xsize, +- raster + (read_ysize - i_row - 1) * read_xsize, ++ memmove( raster + (size_t)(tile_ysize - i_row - 1) * tile_xsize, ++ raster + (size_t)(read_ysize - i_row - 1) * read_xsize, + read_xsize * sizeof(uint32_t) ); +- _TIFFmemset( raster + (tile_ysize - i_row - 1) * tile_xsize+read_xsize, ++ _TIFFmemset( raster + (size_t)(tile_ysize - i_row - 1) * tile_xsize+read_xsize, + 0, sizeof(uint32_t) * (tile_xsize - read_xsize) ); + } + + for( i_row = read_ysize; i_row < tile_ysize; i_row++ ) { +- _TIFFmemset( raster + (tile_ysize - i_row - 1) * tile_xsize, ++ _TIFFmemset( raster + (size_t)(tile_ysize - i_row - 1) * tile_xsize, + 0, sizeof(uint32_t) * tile_xsize ); + } + +-- +GitLab + diff -Nru tiff-4.4.0/debian/patches/series tiff-4.4.0/debian/patches/series --- tiff-4.4.0/debian/patches/series 2022-11-01 14:49:55.000000000 +0100 +++ tiff-4.4.0/debian/patches/series 2022-11-30 16:24:00.000000000 +0100 @@ -5,3 +5,4 @@ CVE-2022-3570_3598.patch CVE-2022-3599.patch CVE-2022-3626_3627.patch +CVE-2022-3970.patch