Skip to content

Commit bdd8fd1

Browse files
Merge PR "[AUTO-CHERRYPICK] [AutoPR- Security] Patch libtiff for CVE-2025-61144, CVE-2025-61143 [Critical] - branch main" #15997
Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com>
1 parent 64f8e20 commit bdd8fd1

File tree

3 files changed

+89
-1
lines changed

3 files changed

+89
-1
lines changed

SPECS/libtiff/CVE-2025-61143.patch

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
From f42a3998f5dba33e187097367079f8ec920a20d5 Mon Sep 17 00:00:00 2001
2+
From: Lee Howard <faxguy@howardsilvan.com>
3+
Date: Fri, 5 Sep 2025 11:48:00 -0700
4+
Subject: [PATCH 1/2] avoid out-of-bounds read identified in #733
5+
6+
---
7+
archive/tools/tiffdither.c | 5 +++++
8+
1 file changed, 5 insertions(+)
9+
10+
diff --git a/archive/tools/tiffdither.c b/archive/tools/tiffdither.c
11+
index 0c86e7f..17673e7 100644
12+
--- a/archive/tools/tiffdither.c
13+
+++ b/archive/tools/tiffdither.c
14+
@@ -87,6 +87,11 @@ static int fsdither(TIFF *in, TIFF *out)
15+
fprintf(stderr, "Out of memory.\n");
16+
goto skip_on_error;
17+
}
18+
+ if (imagewidth > TIFFScanlineSize(in))
19+
+ {
20+
+ fprintf(stderr, "Image width exceeds scanline size.\n");
21+
+ goto skip_on_error;
22+
+ }
23+
24+
/*
25+
* Get first line
26+
--
27+
2.45.4
28+
29+
30+
From c88c56e1ad690bd55a3a2a18a9c68ab49059b11a Mon Sep 17 00:00:00 2001
31+
From: Lee Howard <faxguy@howardsilvan.com>
32+
Date: Fri, 5 Sep 2025 12:11:13 -0700
33+
Subject: [PATCH 2/2] avoid null pointer dereference in tiffcrop #734
34+
35+
Signed-off-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com>
36+
Upstream-reference: https://gitlab.com/libtiff/libtiff/-/merge_requests/755.patch
37+
---
38+
archive/tools/tiffcrop.c | 2 +-
39+
1 file changed, 1 insertion(+), 1 deletion(-)
40+
41+
diff --git a/archive/tools/tiffcrop.c b/archive/tools/tiffcrop.c
42+
index adfd0d2..f69efa8 100644
43+
--- a/archive/tools/tiffcrop.c
44+
+++ b/archive/tools/tiffcrop.c
45+
@@ -2925,7 +2925,7 @@ int main(int argc, char *argv[])
46+
if (dump.outfile != NULL)
47+
{
48+
dump_info(dump.outfile, dump.format, "", "Completed run for %s",
49+
- TIFFFileName(out));
50+
+ out ? TIFFFileName(out) : "(not opened)");
51+
fclose(dump.outfile);
52+
}
53+
}
54+
--
55+
2.45.4
56+

SPECS/libtiff/CVE-2025-61144.patch

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
From d81d8d12a6a050865e09ed1e982a895994ba0dc0 Mon Sep 17 00:00:00 2001
2+
From: Lee Howard <faxguy@howardsilvan.com>
3+
Date: Fri, 5 Sep 2025 13:01:12 -0700
4+
Subject: [PATCH] avoid buffer overflow in tiffcrop #740
5+
6+
Signed-off-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com>
7+
Upstream-reference: https://gitlab.com/libtiff/libtiff/-/merge_requests/757.patch
8+
---
9+
archive/tools/tiffcrop.c | 2 +-
10+
1 file changed, 1 insertion(+), 1 deletion(-)
11+
12+
diff --git a/archive/tools/tiffcrop.c b/archive/tools/tiffcrop.c
13+
index f69efa8..998c6ab 100644
14+
--- a/archive/tools/tiffcrop.c
15+
+++ b/archive/tools/tiffcrop.c
16+
@@ -4375,7 +4375,7 @@ static int combineSeparateSamplesBytes(unsigned char *srcbuffs[],
17+
{
18+
if ((dumpfile != NULL) && (level == 2))
19+
{
20+
- for (s = 0; s < spp; s++)
21+
+ for (s = 0; (s < spp) && (s < MAX_SAMPLES); s++)
22+
{
23+
dump_info(dumpfile, format, "combineSeparateSamplesBytes",
24+
"Input data, Sample %" PRIu16, s);
25+
--
26+
2.45.4
27+

SPECS/libtiff/libtiff.spec

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
Summary: TIFF libraries and associated utilities.
22
Name: libtiff
33
Version: 4.6.0
4-
Release: 11%{?dist}
4+
Release: 12%{?dist}
55
License: libtiff
66
Vendor: Microsoft Corporation
77
Distribution: Mariner
@@ -21,6 +21,8 @@ Patch9: CVE-2025-9165.patch
2121
Patch10: CVE-2025-9900.patch
2222
Patch11: CVE-2024-13978.patch
2323
Patch12: CVE-2025-8961.patch
24+
Patch13: CVE-2025-61143.patch
25+
Patch14: CVE-2025-61144.patch
2426
BuildRequires: autoconf
2527
BuildRequires: automake
2628
BuildRequires: libjpeg-turbo-devel
@@ -73,6 +75,9 @@ make %{?_smp_mflags} -k check
7375
%{_docdir}/*
7476

7577
%changelog
78+
* Wed Feb 25 2026 Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> - 4.6.0-12
79+
- Patch for CVE-2025-61144, CVE-2025-61143
80+
7681
* Thu Nov 27 2025 Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> - 4.6.0-11
7782
- Patch for CVE-2025-8961
7883

0 commit comments

Comments
 (0)