From patchwork Tue Nov 18 10:31:23 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 74886 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B80F4CED24E for ; Tue, 18 Nov 2025 10:31:39 +0000 (UTC) Received: from mail-wm1-f47.google.com (mail-wm1-f47.google.com [209.85.128.47]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.9415.1763461892280778547 for ; Tue, 18 Nov 2025 02:31:32 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=kJp/xX3C; spf=pass (domain: gmail.com, ip: 209.85.128.47, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f47.google.com with SMTP id 5b1f17b1804b1-47755de027eso36716005e9.0 for ; Tue, 18 Nov 2025 02:31:32 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1763461891; x=1764066691; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:from:to:cc:subject:date:message-id:reply-to; bh=wUViEkyBYse2/CSpeN0PgB24SSZZQq99g0pigssvdqM=; b=kJp/xX3CQJxb0Y9Y1zUr6YEd3RdW8RT9HnG+5E5736PKbFzSt+NQtNzqDzi4TuaK42 nZ7fe7HXESZC61hhlb61NmC11UofxOi1T5y1YtWA60HTqeEhg3eb/99KmF7O1m2i2SeJ OwFQ+wZILj/KVe+JADiKPNMFfKGqQQzaw9mE0sbC0LqNOmRdkGvyUP9XPp03RQ2A9N0l 5E09sj9ic0YhMlQDu7NU0Fz6mK58juDZjtfpJIEUXnR+YmldcrmOWRXgo4OocnqxirJY OyEP+mofmVgfxq3Aeg8qkanrF7aT4Nc8ml8KvdIDjYlFhEt746o6sW6TYEzI68oXfB4B SKXA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763461891; x=1764066691; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=wUViEkyBYse2/CSpeN0PgB24SSZZQq99g0pigssvdqM=; b=MWILoFVefBt7TLtuXC6DeUw91dC7S/NRomCnboUYveYALgKihPkJL9oKYcpnaAg/9n 3XAaO2vuyXIjJpE1HJYjMW5ckIP8LM0ebW1pjNtijye4NKvKk7MgJni3tm73mUUcdqQt YKID14v+D/68D45kLeiiEz5S6iVdYHuihUy/FAjuoUOC37Qr5p6fn40rdkwFT9EgYOYO 1LgSVU15FIMrpc/X5xE+Kz40yQZZuj5mbpz/91wmcP2SVXoJaNKd8gTy0BzFttb/6ji2 RXkd6f7EWWwfThLJUav/pytT+5K7Nkxi11v5Ib8vvAWCpYKBDQkjlFt+Ah82EYNEG+1E DoZg== X-Gm-Message-State: AOJu0Yzd3zt7xF+0Ofcfv9klgojXMhHo1taZmaTiXfDhh6uyxJrCUwJw iJ7xA89oUl+lWG4CQh8ahUxoA+97Yoqv6AmhIaAUVLiHr/J5ARqqS77WIwkztJhp X-Gm-Gg: ASbGnctlz1VELHggnJwhqzkTBpyG+1CaDQCLYyf/FSxMb2E9p9eQU2eJ3fg1qWTKqGG xxIw7MCuzU1rZkNm4FDHb3ayR1lXKjPdgNDPtdFCyYMSWqc91XWIj5yJsjE5A+wKclmx1dS3q8c kWScuXXmwDBJWyKwWeaj+LSIV8/1JlWnyuW45dLVDnVGXEtN/pudZqJFrI6YuyJ5vEbdBdlgTyB X/hqHmJGfrZMt6avW4LRnRBzvkYa2LbjoK2ozuBzTuNRM45pY/eQRzTWUKhwSxwvJ3MLdbeBT5m LItqkaq567UGRi55ScvTPSb7sXLoK7rAOB8WVLlICnYlndq9DTpSK+yvHtNfIR7cOViQG1HzZWI L/9AXR3wEksp14DjcmMIx1pR00x1nF1bYt3i3IVjW5rwZBd9xliU38nyJkSp00+P5xmgq/IhzQk K69GuaSWzH4hbqCbsSjSPh8YYlzNR2zA== X-Google-Smtp-Source: AGHT+IEArXZdU62qShHWV9RevlLRPHgx/i5mhKkg6s70Mu8jRsdGDM370Y6+NwC7LZ2/KKMbpC+AuQ== X-Received: by 2002:a05:600c:6385:b0:477:9814:6882 with SMTP id 5b1f17b1804b1-477981470c2mr117663575e9.5.1763461890327; Tue, 18 Nov 2025 02:31:30 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-477a81c567bsm55743925e9.9.2025.11.18.02.31.29 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 18 Nov 2025 02:31:29 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][scarthgap][PATCH 1/6] libwmf: add proper CVE tag to patch Date: Tue, 18 Nov 2025 11:31:23 +0100 Message-ID: <20251118103128.1471091-1-skandigraun@gmail.com> X-Mailer: git-send-email 2.51.2 MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 18 Nov 2025 10:31:39 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/121843 CVE-2009-1364 is already patched, but the patch didn't contain the necessary tag so the cve-checker didn't pick it up. This change adds the required tag. Signed-off-by: Gyorgy Sarvari --- .../libwmf/libwmf/libwmf-0.2.8.4-useafterfree.patch | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta-oe/recipes-extended/libwmf/libwmf/libwmf-0.2.8.4-useafterfree.patch b/meta-oe/recipes-extended/libwmf/libwmf/libwmf-0.2.8.4-useafterfree.patch index 9a8cbcb508..3e6ad6a49b 100644 --- a/meta-oe/recipes-extended/libwmf/libwmf/libwmf-0.2.8.4-useafterfree.patch +++ b/meta-oe/recipes-extended/libwmf/libwmf/libwmf-0.2.8.4-useafterfree.patch @@ -4,6 +4,8 @@ Upstream-Status: Pending http://cvs.fedoraproject.org/viewvc/devel/libwmf/libwmf-0.2.8.4-useafterfree.patch?view=log Resolves: CVE-2009-1364 +CVE: CVE-2009-1364 + --- libwmf-0.2.8.4/src/extra/gd/gd_clip.c.CVE-2009-1364-im-clip-list 2009-04-24 04:06:44.000000000 -0400 +++ libwmf-0.2.8.4/src/extra/gd/gd_clip.c 2009-04-24 04:08:30.000000000 -0400 @@ -70,6 +70,7 @@ void gdClipSetAdd(gdImagePtr im,gdClipRe From patchwork Tue Nov 18 10:31:24 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 74887 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C6703CED272 for ; Tue, 18 Nov 2025 10:31:39 +0000 (UTC) Received: from mail-wm1-f54.google.com (mail-wm1-f54.google.com [209.85.128.54]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.9416.1763461893078429189 for ; Tue, 18 Nov 2025 02:31:33 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=HyGMltJV; spf=pass (domain: gmail.com, ip: 209.85.128.54, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f54.google.com with SMTP id 5b1f17b1804b1-477a219db05so14262725e9.2 for ; Tue, 18 Nov 2025 02:31:32 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1763461891; x=1764066691; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=3T9pbSLdnw0Ya2a1whqTiqheGh8LJLk+MCV+99M0OKU=; b=HyGMltJVyM1CEj61G//1GqSzeCVeu20fZtuLJrPf+sFJXkoTdIBkTSPMmO4CXWFFIb KpmCmJny7hL4Obw9L8gQznHRpxz73oAwTjjYe/LNa4m0rXgp3/TKHcTIPdYPN+/FWd+4 l3ux5pQdjfxoCOpyUoir9fdLGyVyNGOrsPfY9rr12+hhCz+PwBaU71AddK8rbmMoA586 4S9VEBxcOvJvif7qqWIrx1VdmX6h19EP2UkxUfvv9xG13BKNa5bnoJ0sqC1ayRMcu3bP u2KqucWrDFBsMu6LGzkB6Os5Z9bLmRZap2L7IQYvWt28skOh/bexAk+djvQGueWsDgHp EOAQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763461891; x=1764066691; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=3T9pbSLdnw0Ya2a1whqTiqheGh8LJLk+MCV+99M0OKU=; b=af362MJzlc86FP4pUszd6tTTLC51JwuRwmDsOR+Cz7lgwYoZDlEPOi9sZoOzbH+0Nl xMTun2Y1Etoz7tE9FsoKLDViNNvqmnJffjot4PZaNJEiNJXocRMeW6aQrsecupZTBBfA a61xVfqaGQKR27hlAzYrfUF+hk/2AJ7DxUTwQcvEsRZUcwQdqRz4sTjELImZPr2w5Xcz 0Ao9OKqffgyI6M5c+dkscGrcwjNrrglYu6jeyewgaEzTdchK37q7Ch7dFs83wz4QUxUs 8UUBjecAlOrvPMytt936rpnNicBs2lawGV7qrEAOdSD9sL2VheO6ch02IjgkAFFg9TTN 8WRQ== X-Gm-Message-State: AOJu0YxX2Wg/HJg1u7fFxe1nWlRbWfDcwCcPGjfs3149SK5RGiCgFrtf M48OIpUudC0G+CpWuNOJBPy3x28AvRM9Zs3IolYANbXJ88LOTz457B6sNLlxthjP X-Gm-Gg: ASbGncvd2a1WnwRn/KzDgaOMby37LKWemxuyTAr72j/MiPZAx36b2X3P2QvuzQz9/Q8 LvjHpILSkeCisrurRk7Lfl9HxE1A+6fuWPSib0S+lErMhzmkZq8t7ZqnzReAKmhgpZEO9FCeG8g AQ/0lN6fuKPY0ry3j7qG1vwrUUFBZj6bLp2Kh84g7eWaf46Zo4Z+5VChwSHDIAfSrM1O9ctR7N1 0s2H4ZKdeRurOonNmi6q39dJYBaTyEB3bgp4zy8UvqEWGSNNnC2ZusMH2RdIfb6fvGIHyLh24VB EwJr56v5k5PBvLcrbAS3vIw5wuKHsGHP9sSMPxBTe2+3u92ebq5bf4qM0ctqV1lHZedj2R1rqYd HGlC31Ys7MDq9nV3ZkcVNdBPrR6UacnV3Ls3ZmAH7CBDaZmJHNUqmZaavAB5bSiiuSr0ro3oHzr 0v3MyzbPfAZ4ssBXnn/uA= X-Google-Smtp-Source: AGHT+IHFu5wzzLV0WhfmlxBl/WwlzBt0Qm7b67aHBdLCpwpyPnxy/4lAsu/xVeSN+OL83hblc5RbjQ== X-Received: by 2002:a05:600c:1f91:b0:475:dd9a:f791 with SMTP id 5b1f17b1804b1-4778feadab1mr136288595e9.28.1763461891203; Tue, 18 Nov 2025 02:31:31 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-477a81c567bsm55743925e9.9.2025.11.18.02.31.30 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 18 Nov 2025 02:31:30 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][scarthgap][PATCH 2/6] libwmf: add missing CVE tag to patch Date: Tue, 18 Nov 2025 11:31:24 +0100 Message-ID: <20251118103128.1471091-2-skandigraun@gmail.com> X-Mailer: git-send-email 2.51.2 In-Reply-To: <20251118103128.1471091-1-skandigraun@gmail.com> References: <20251118103128.1471091-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 18 Nov 2025 10:31:39 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/121844 CVE-2006-3376 is already patched, but the patch is missing the required CVE tag, so the cve-checker misses it. This patch adds the tag. Signed-off-by: Gyorgy Sarvari --- .../libwmf/libwmf/libwmf-0.2.8.4-intoverflow.patch | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta-oe/recipes-extended/libwmf/libwmf/libwmf-0.2.8.4-intoverflow.patch b/meta-oe/recipes-extended/libwmf/libwmf/libwmf-0.2.8.4-intoverflow.patch index 4e7cd8887a..ffec9fb685 100644 --- a/meta-oe/recipes-extended/libwmf/libwmf/libwmf-0.2.8.4-intoverflow.patch +++ b/meta-oe/recipes-extended/libwmf/libwmf/libwmf-0.2.8.4-intoverflow.patch @@ -4,6 +4,8 @@ http://cvs.fedoraproject.org/viewvc/devel/libwmf/libwmf-0.2.8.4-intoverflow.patc CVE-2006-3376 libwmf integer overflow +CVE: CVE-2006-3376 + --- libwmf-0.2.8.4.orig/src/player.c 2002-12-10 19:30:26.000000000 +0000 +++ libwmf-0.2.8.4/src/player.c 2006-07-12 15:12:52.000000000 +0100 @@ -42,6 +42,7 @@ From patchwork Tue Nov 18 10:31:25 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 74888 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D5A27CED279 for ; Tue, 18 Nov 2025 10:31:39 +0000 (UTC) Received: from mail-wm1-f45.google.com (mail-wm1-f45.google.com [209.85.128.45]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.9417.1763461893740601976 for ; Tue, 18 Nov 2025 02:31:34 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=Gq0jB647; spf=pass (domain: gmail.com, ip: 209.85.128.45, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f45.google.com with SMTP id 5b1f17b1804b1-47774d3536dso43854185e9.0 for ; Tue, 18 Nov 2025 02:31:33 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1763461892; x=1764066692; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=n0b0m7vueIxMY/qUlZQPRKSE6qmA9ulEChNdfw0Oa04=; b=Gq0jB647SMHKt9nJW/yUO0zomnIjeG57TmjNetJhhCC20GT4dfELEYksAc15qIE5Al 5k//CidRpyJ4OqWZo1THx09JqSV3RF0yyOrpj48QujmkVSJTFKBT59t03I1K3OIx2goE k0G9Tqesj2WRzA3WOt5aoA+wur7Gd765Q3MY50no0rNcgYM3stqjfxEbgA41zFLuFci/ XKrR+FRYZ9AdEq/U9vZ6Rb0Osv2pYVUbJ1IAjlELoF3ik6hVPTFOpQevFeJPo3uMUGLP +H+65O6g2tVT1Umf18pMRVV+vwXdviDUfOk4Q21d9KtpdpFlbS6JBwQH4xQOcxoKZQNZ 2mqA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763461892; x=1764066692; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=n0b0m7vueIxMY/qUlZQPRKSE6qmA9ulEChNdfw0Oa04=; b=sCZU/JB64AIw0YtVEPh0rGvWE3bqTFQAxYHoMZitirI3TphSyHEsSboZAmjWAeRM1X jCLjv7sV75keH34Lhlb2QNdwVFIIOPR7gaupc9nKypbdJpli4GjxVw4aNJ3fx2qhz2gV aFEYvhhtNbSZecKaSBdVZrpmuNqEqfHKu51QG18aj410ns2oSDKxoHIgPqdu0NtiiSMS IvALdefrDcmbtgwHc1+jHC0NO6PNesY1UMP/zzfYaxM/lB/HNFhMyJWltXJAJfMbZxJa 5R1iZJTediE+9LJwbeYrG2EHuvXaH/bDd2k8E0JjRYAbk6/QLYj7Me40Y8Gpv4sQtj7z yn0g== X-Gm-Message-State: AOJu0Yygh08lMuS4k+coKqBa7MrwetjL3KBmhQsHZZXOdyCynawiH5Jk 0Cb2FrlbkovfYcPe8gEWsFHanYQL6lY7AbxBLGDd/chvyFscZXIh/V18d9fcr5Kr X-Gm-Gg: ASbGncv3VgbUHpmWLY07J7qKFCu4pIyJshRrnnF1tVcP0/aGtQA29R38H2VJ2xitZSC PUJq9qy6vVLIF5GTcz+Hj17plVUE9ca8vmn+9pCtmfePQ1Kz8BXawI9+u9Ty0HGPpLunq0wmNdT 4KaYinM/M4UfxWYMlJG8Kfunx0PQB5cueGmHVTfeo1SKtRIT9GFsUBgQLKTHD+DQmlFDDkSMRSC Y+63s+ws3X+Rc2jlRyABm3MS6WK6naSThgz4j8yO36ImvWCBW3nZW6+uWV4NVKrAxiT+/hxcl2n 1m5GZ3QBeC5B/54AnZ9PKygdBNw/aNLIPMD+KhG/E81stLPhiysnC5ac40OoJgY4gLAHGiWmKzX u7BFWW6Y+2IYJLXTlauwVo2Y1ZG7QKP3q2LLsjhJb7D747X37vff8RNOGn37rs0ZBU2cyFMrIyT DlbA/DZ+VD X-Google-Smtp-Source: AGHT+IEbvZe3AosdMOBpKGsKQ5kY6bhdUmXKkcvc/9aclXJsZ+94cidXbe/B7GX7i43hbON0RMRYBg== X-Received: by 2002:a05:600c:c1c8:20b0:477:a2f7:74de with SMTP id 5b1f17b1804b1-477a94acee9mr18436965e9.3.1763461891888; Tue, 18 Nov 2025 02:31:31 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-477a81c567bsm55743925e9.9.2025.11.18.02.31.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 18 Nov 2025 02:31:31 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][scarthgap][PATCH 3/6] libwmf: patch CVE-2015-0848 and CVE-2015-4588 Date: Tue, 18 Nov 2025 11:31:25 +0100 Message-ID: <20251118103128.1471091-3-skandigraun@gmail.com> X-Mailer: git-send-email 2.51.2 In-Reply-To: <20251118103128.1471091-1-skandigraun@gmail.com> References: <20251118103128.1471091-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 18 Nov 2025 10:31:39 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/121845 Details: https://nvd.nist.gov/vuln/detail/CVE-2015-0848 https://nvd.nist.gov/vuln/detail/CVE-2015-4588 Pick the commit that mentions the CVE IDs explicitly. The same patch fixes both vulnerabilities. Signed-off-by: Gyorgy Sarvari --- .../libwmf/CVE-2015-0848-CVE-2015-4588.patch | 135 ++++++++++++++++++ .../recipes-extended/libwmf/libwmf_0.2.8.4.bb | 3 +- 2 files changed, 137 insertions(+), 1 deletion(-) create mode 100644 meta-oe/recipes-extended/libwmf/libwmf/CVE-2015-0848-CVE-2015-4588.patch diff --git a/meta-oe/recipes-extended/libwmf/libwmf/CVE-2015-0848-CVE-2015-4588.patch b/meta-oe/recipes-extended/libwmf/libwmf/CVE-2015-0848-CVE-2015-4588.patch new file mode 100644 index 0000000000..b65610aa88 --- /dev/null +++ b/meta-oe/recipes-extended/libwmf/libwmf/CVE-2015-0848-CVE-2015-4588.patch @@ -0,0 +1,135 @@ +From f42e4f4505b07278f4baccddfc1f47059ae4f931 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= +Date: Wed, 8 Aug 2018 13:59:18 +0100 +Subject: [PATCH] CVE-2015-0848+CVE-2015-4588 + +CVE: CVE-2015-0848 CVE-2015-4588 +Upstream-Status: Backport [https://github.com/caolanm/libwmf/commit/879d6bffa6dd21b8c0e9ec3b5aa31b6ae090ef83] +Signed-off-by: Gyorgy Sarvari +--- + src/ipa/ipa.h | 2 +- + src/ipa/ipa/bmp.h | 38 +++++++++++++++++++++++++++++++------- + 2 files changed, 32 insertions(+), 8 deletions(-) + +diff --git a/src/ipa/ipa.h b/src/ipa/ipa.h +index d050a7e..3003540 100644 +--- a/src/ipa/ipa.h ++++ b/src/ipa/ipa.h +@@ -48,7 +48,7 @@ static int ReadBlobByte (BMPSource*); + static unsigned short ReadBlobLSBShort (BMPSource*); + static unsigned long ReadBlobLSBLong (BMPSource*); + static long TellBlob (BMPSource*); +-static void DecodeImage (wmfAPI*,wmfBMP*,BMPSource*,unsigned int,unsigned char*); ++static int DecodeImage (wmfAPI*,wmfBMP*,BMPSource*,unsigned int,unsigned char*); + static void ReadBMPImage (wmfAPI*,wmfBMP*,BMPSource*); + static int ExtractColor (wmfAPI*,wmfBMP*,wmfRGB*,unsigned int,unsigned int); + static void SetColor (wmfAPI*,wmfBMP*,wmfRGB*,unsigned char,unsigned int,unsigned int); +diff --git a/src/ipa/ipa/bmp.h b/src/ipa/ipa/bmp.h +index 29eee34..7751a36 100644 +--- a/src/ipa/ipa/bmp.h ++++ b/src/ipa/ipa/bmp.h +@@ -859,7 +859,7 @@ static long TellBlob (BMPSource* src) + % + % + */ +-static void DecodeImage (wmfAPI* API,wmfBMP* bmp,BMPSource* src,unsigned int compression,unsigned char* pixels) ++static int DecodeImage (wmfAPI* API,wmfBMP* bmp,BMPSource* src,unsigned int compression,unsigned char* pixels) + { int byte; + int count; + int i; +@@ -870,12 +870,14 @@ static void DecodeImage (wmfAPI* API,wmfBMP* bmp,BMPSource* src,unsigned int com + U32 u; + + unsigned char* q; ++ unsigned char* end; + + for (u = 0; u < ((U32) bmp->width * (U32) bmp->height); u++) pixels[u] = 0; + + byte = 0; + x = 0; + q = pixels; ++ end = pixels + bmp->width * bmp->height; + + for (y = 0; y < bmp->height; ) + { count = ReadBlobByte (src); +@@ -884,7 +886,10 @@ static void DecodeImage (wmfAPI* API,wmfBMP* bmp,BMPSource* src,unsigned int com + { /* Encoded mode. */ + byte = ReadBlobByte (src); + for (i = 0; i < count; i++) +- { if (compression == 1) ++ { ++ if (q == end) ++ return 0; ++ if (compression == 1) + { (*(q++)) = (unsigned char) byte; + } + else +@@ -896,13 +901,15 @@ static void DecodeImage (wmfAPI* API,wmfBMP* bmp,BMPSource* src,unsigned int com + else + { /* Escape mode. */ + count = ReadBlobByte (src); +- if (count == 0x01) return; ++ if (count == 0x01) return 1; + switch (count) + { + case 0x00: + { /* End of line. */ + x = 0; + y++; ++ if (y >= bmp->height) ++ return 0; + q = pixels + y * bmp->width; + break; + } +@@ -910,13 +917,20 @@ static void DecodeImage (wmfAPI* API,wmfBMP* bmp,BMPSource* src,unsigned int com + { /* Delta mode. */ + x += ReadBlobByte (src); + y += ReadBlobByte (src); ++ if (y >= bmp->height) ++ return 0; ++ if (x >= bmp->width) ++ return 0; + q = pixels + y * bmp->width + x; + break; + } + default: + { /* Absolute mode. */ + for (i = 0; i < count; i++) +- { if (compression == 1) ++ { ++ if (q == end) ++ return 0; ++ if (compression == 1) + { (*(q++)) = ReadBlobByte (src); + } + else +@@ -943,7 +957,7 @@ static void DecodeImage (wmfAPI* API,wmfBMP* bmp,BMPSource* src,unsigned int com + byte = ReadBlobByte (src); /* end of line */ + byte = ReadBlobByte (src); + +- return; ++ return 1; + } + + /* +@@ -1143,8 +1157,18 @@ static void ReadBMPImage (wmfAPI* API,wmfBMP* bmp,BMPSource* src) + } + } + else +- { /* Convert run-length encoded raster pixels. */ +- DecodeImage (API,bmp,src,(unsigned int) bmp_info.compression,data->image); ++ { ++ if (bmp_info.bits_per_pixel == 8) /* Convert run-length encoded raster pixels. */ ++ { ++ if (!DecodeImage (API,bmp,src,(unsigned int) bmp_info.compression,data->image)) ++ { WMF_ERROR (API,"corrupt bmp"); ++ API->err = wmf_E_BadFormat; ++ } ++ } ++ else ++ { WMF_ERROR (API,"Unexpected pixel depth"); ++ API->err = wmf_E_BadFormat; ++ } + } + + if (ERR (API)) diff --git a/meta-oe/recipes-extended/libwmf/libwmf_0.2.8.4.bb b/meta-oe/recipes-extended/libwmf/libwmf_0.2.8.4.bb index 93b58057ce..bea9ed6dc8 100644 --- a/meta-oe/recipes-extended/libwmf/libwmf_0.2.8.4.bb +++ b/meta-oe/recipes-extended/libwmf/libwmf_0.2.8.4.bb @@ -19,7 +19,8 @@ SRC_URI = "${SOURCEFORGE_MIRROR}/wvware/${BPN}/${PV}/${BPN}-${PV}.tar.gz;name=ta file://libwmf-0.2.8.4-intoverflow.patch \ file://libwmf-0.2.8.4-useafterfree.patch \ file://0001-configure-use-pkg-config-for-freetype.patch \ - " + file://CVE-2015-0848-CVE-2015-4588.patch \ + " SRC_URI[tarball.md5sum] = "d1177739bf1ceb07f57421f0cee191e0" SRC_URI[tarball.sha256sum] = "5b345c69220545d003ad52bfd035d5d6f4f075e65204114a9e875e84895a7cf8" From patchwork Tue Nov 18 10:31:26 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 74891 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id DA62ACED27B for ; Tue, 18 Nov 2025 10:31:39 +0000 (UTC) Received: from mail-wm1-f44.google.com (mail-wm1-f44.google.com [209.85.128.44]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.9418.1763461894375222379 for ; Tue, 18 Nov 2025 02:31:34 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=gthgNhJP; spf=pass (domain: gmail.com, ip: 209.85.128.44, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f44.google.com with SMTP id 5b1f17b1804b1-477632d9326so36126465e9.1 for ; Tue, 18 Nov 2025 02:31:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1763461893; x=1764066693; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=8E5G/WXZrknHdgrVwEPbggNc2daDaBxr15FVhUMAACQ=; b=gthgNhJP/IMIeD7/eI0y6k4kaBm22rpw/xc7yQMZlYpbuiDNlpbciuQ0tYPIxSpSzp 8KrmP1SaC7pKuZkqZ7yVyuI0HGcFwntrLhv0gVRmeJqrXCJ7gvBgV0uEF6677f+iTWmv jZy9WZeCS/PLVahDNhJ3KQqVkmeiOwNUH71iuHT24wLzZd6KD8WDzMKr9cuJHk2dgWNy Ijshlnz1holq5nI4JsR/d5L/YoP5Ra+siXWtpW5oF2gRxqPjTJdtQulo6A0q6lzmqKGj O49z3DOl4XwzogO+RVTqk1JdOO3mKABOVIdNlwRgYD0bsI2z/57VB/wHmb61WbaUH3Nm 6Z0w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763461893; x=1764066693; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=8E5G/WXZrknHdgrVwEPbggNc2daDaBxr15FVhUMAACQ=; b=JiGrhpkGiSuONJrr+z2g6Orn6iUdcyYquD6yy+dH/WgtHz0IvwJbuhA3Pj0w/gXEJv YWFxmZnLdn92nCZtBnVYjrgyrpFFTIE+OVyaSOi56IYMFX1ne5/Sjr7/HAh2Si/TVfty pEa50EEALVCWbSh18ybnH1g/OvkEc+2jDwn1iggfckr9fjP5pdJLmj05MpbFTDb82SxY zYXZ3zSNRvLkmoedFmI5gxbireGT1I8Oxt4doqp0yp8RXhxSggdHNeYJTabonRkA10pH 7u2kJGBftPjp70tbbiCXLygKGUtrWnI2ELYAzQvAnanhmUBgcvyswENsFB94eNvzUZ9b F7xw== X-Gm-Message-State: AOJu0Yx8/1GFF6JwbjG3PotmqQOBIt3pf9FPFX+/ybWGFgc1u7eTPr07 w+9B5X9N0AAsKkgl3d9H7WVxKC14Jw3KQXZMcHG1IzOo10Ubnx/92MmKVBqw14Zn X-Gm-Gg: ASbGncsrqDplHqDR9oHgCjAaFgNCBGt5rs7A37fKX7IlZwtUlPGphVYgZtl09QtMSfZ sZRX48UXGznh7Vx+rVH/WXTDvP63DY3WPbE10aJ4D5RxpQ7jX6NWh0C/qht5SItI+RWnyvPA7a9 hw4c2Nm0SapoZYMcMBI0swx3TiUDtDWHmCa6HmQ/TzmjXutM2EEMIypOEfCv1dXNwB0DBd2nK8z ZoztpZMq3Dq7TeT2p0Rvc+99LC8zt/NLDrKbzq81Y7qSSugQQymuYB4Ki8JOaNbONOZhOcM9bF8 y1FvhLCP/6pDhi0hxMBIJWHDuUDZJggyueGjbaiMnlX2Xe6KN9xDhwpp+yZ0FiiGE3O5TJUksFA 5WTsm/x09HeCzaL8Oh3nAqGTMicr8aZsMO8jfsCQtCpY/zbDQJHbEKlrdGVCK5z2koW0YlrFgsh 8CXL0Ib9HN X-Google-Smtp-Source: AGHT+IG7omhLzo/tLwYy/fID3YhN+nkTT+4tjLK18fDHjiZNvoY5QXZ8yVEUgkUGgsaVl5CVg0MDZA== X-Received: by 2002:a05:600c:1986:b0:46e:35a0:3587 with SMTP id 5b1f17b1804b1-4778fea7037mr140631085e9.27.1763461892573; Tue, 18 Nov 2025 02:31:32 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-477a81c567bsm55743925e9.9.2025.11.18.02.31.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 18 Nov 2025 02:31:32 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][scarthgap][PATCH 4/6] libwmf: patch CVE-2015-4695 Date: Tue, 18 Nov 2025 11:31:26 +0100 Message-ID: <20251118103128.1471091-4-skandigraun@gmail.com> X-Mailer: git-send-email 2.51.2 In-Reply-To: <20251118103128.1471091-1-skandigraun@gmail.com> References: <20251118103128.1471091-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 18 Nov 2025 10:31:39 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/121846 From: Gyorgy Sarvari via lists.openembedded.org Details: https://nvd.nist.gov/vuln/detail/CVE-2015-4695 Pick the commit that explicitly mentions the vulnerability ID. Signed-off-by: Gyorgy Sarvari --- .../libwmf/libwmf/CVE-2015-4695.patch | 70 +++++++++++++++++++ .../recipes-extended/libwmf/libwmf_0.2.8.4.bb | 1 + 2 files changed, 71 insertions(+) create mode 100644 meta-oe/recipes-extended/libwmf/libwmf/CVE-2015-4695.patch diff --git a/meta-oe/recipes-extended/libwmf/libwmf/CVE-2015-4695.patch b/meta-oe/recipes-extended/libwmf/libwmf/CVE-2015-4695.patch new file mode 100644 index 0000000000..fe6163af3e --- /dev/null +++ b/meta-oe/recipes-extended/libwmf/libwmf/CVE-2015-4695.patch @@ -0,0 +1,70 @@ +From 7a7f58c0ebb84b9a3c44c875a667ce8ba191b325 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= +Date: Wed, 8 Aug 2018 13:59:37 +0100 +Subject: [PATCH] CVE-2015-4695 + +CVE: CVE-2015-4695 +Upstream-Status: Backport [https://github.com/caolanm/libwmf/commit/b5ae5d1f3bbddf051a5c9dd01897bd835817f013] +Signed-off-by: Gyorgy Sarvari +--- + src/player/meta.h | 12 ++++++------ + 1 file changed, 6 insertions(+), 6 deletions(-) + +diff --git a/src/player/meta.h b/src/player/meta.h +index 252e68b..3e13688 100644 +--- a/src/player/meta.h ++++ b/src/player/meta.h +@@ -1565,7 +1565,7 @@ static int meta_rgn_create (wmfAPI* API,wmfRecord* Record,wmfAttributes* attrlis + objects = P->objects; + + i = 0; +- while (objects[i].type && (i < NUM_OBJECTS (API))) i++; ++ while ((i < NUM_OBJECTS (API)) && objects[i].type) i++; + + if (i == NUM_OBJECTS (API)) + { WMF_ERROR (API,"Object out of range!"); +@@ -2142,7 +2142,7 @@ static int meta_dib_brush (wmfAPI* API,wmfRecord* Record,wmfAttributes* attrlist + objects = P->objects; + + i = 0; +- while (objects[i].type && (i < NUM_OBJECTS (API))) i++; ++ while ((i < NUM_OBJECTS (API)) && objects[i].type) i++; + + if (i == NUM_OBJECTS (API)) + { WMF_ERROR (API,"Object out of range!"); +@@ -3067,7 +3067,7 @@ static int meta_pen_create (wmfAPI* API,wmfRecord* Record,wmfAttributes* attrlis + objects = P->objects; + + i = 0; +- while (objects[i].type && (i < NUM_OBJECTS (API))) i++; ++ while ((i < NUM_OBJECTS (API)) && objects[i].type) i++; + + if (i == NUM_OBJECTS (API)) + { WMF_ERROR (API,"Object out of range!"); +@@ -3181,7 +3181,7 @@ static int meta_brush_create (wmfAPI* API,wmfRecord* Record,wmfAttributes* attrl + objects = P->objects; + + i = 0; +- while (objects[i].type && (i < NUM_OBJECTS (API))) i++; ++ while ((i < NUM_OBJECTS (API)) && objects[i].type) i++; + + if (i == NUM_OBJECTS (API)) + { WMF_ERROR (API,"Object out of range!"); +@@ -3288,7 +3288,7 @@ static int meta_font_create (wmfAPI* API,wmfRecord* Record,wmfAttributes* attrli + objects = P->objects; + + i = 0; +- while (objects[i].type && (i < NUM_OBJECTS (API))) i++; ++ while ((i < NUM_OBJECTS (API)) && objects[i].type) i++; + + if (i == NUM_OBJECTS (API)) + { WMF_ERROR (API,"Object out of range!"); +@@ -3396,7 +3396,7 @@ static int meta_palette_create (wmfAPI* API,wmfRecord* Record,wmfAttributes* att + objects = P->objects; + + i = 0; +- while (objects[i].type && (i < NUM_OBJECTS (API))) i++; ++ while ((i < NUM_OBJECTS (API)) && objects[i].type) i++; + + if (i == NUM_OBJECTS (API)) + { WMF_ERROR (API,"Object out of range!"); diff --git a/meta-oe/recipes-extended/libwmf/libwmf_0.2.8.4.bb b/meta-oe/recipes-extended/libwmf/libwmf_0.2.8.4.bb index bea9ed6dc8..364bf4b022 100644 --- a/meta-oe/recipes-extended/libwmf/libwmf_0.2.8.4.bb +++ b/meta-oe/recipes-extended/libwmf/libwmf_0.2.8.4.bb @@ -20,6 +20,7 @@ SRC_URI = "${SOURCEFORGE_MIRROR}/wvware/${BPN}/${PV}/${BPN}-${PV}.tar.gz;name=ta file://libwmf-0.2.8.4-useafterfree.patch \ file://0001-configure-use-pkg-config-for-freetype.patch \ file://CVE-2015-0848-CVE-2015-4588.patch \ + file://CVE-2015-4695.patch \ " SRC_URI[tarball.md5sum] = "d1177739bf1ceb07f57421f0cee191e0" From patchwork Tue Nov 18 10:31:27 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 74890 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E2F89CED27F for ; Tue, 18 Nov 2025 10:31:39 +0000 (UTC) Received: from mail-wm1-f50.google.com (mail-wm1-f50.google.com [209.85.128.50]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.9420.1763461895033288508 for ; Tue, 18 Nov 2025 02:31:35 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=LL8cAwch; spf=pass (domain: gmail.com, ip: 209.85.128.50, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f50.google.com with SMTP id 5b1f17b1804b1-477563e28a3so36281225e9.1 for ; Tue, 18 Nov 2025 02:31:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1763461893; x=1764066693; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=T36cAy7La38mJmHQ3MJA2Li8IBUsidfc3+aBaj4VI/U=; b=LL8cAwchop1diU6T4ERa9NVYqxmeC+xjomrL0oDImsEEkV9UmgKeheO4NzX/PwSzK0 44BXwpgMxG5qA1aE7al0OeG+uTB01nOeFPHqIy5bbKx7X4+4ZAM8DVPnXPwgTONmhw16 zYyLIkQb4q5xsRCBhRsF4brwHaHSMVF/AUWnTAAWUOXMEBLREz/EdkD9iaRRMoOsLLIm 0Nxd5zSyRCpuHcMjMCOhwMIWa9kFp+612DiB7quhpMP5lzZBA7Y37blbCpx8K49Fc9kM rUdBGFf+2UG6PBvvfK1jkV2TFFVnpUP76+IKZ0vZSvd8YvX4Rzxn4dmdTmgh6zA765cW gdIg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763461893; x=1764066693; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=T36cAy7La38mJmHQ3MJA2Li8IBUsidfc3+aBaj4VI/U=; b=OBm68IqNoIO1+5RnvFonvtOS0hh+iUbDiucFXsftbXJUchKC+/M7uHRv9Z12BDx4Av 7zHiMB4b1J3REcYeog8ih9/VxUtWuZWGFLyPOYnGJpK2JxQEbPx+ZV3kdApnk5fiOx3P jN5lftnvDMJgfy+Mfg+J2QSHLGtKmvpOepJgoilxEEUzs3u3wrGZ0L/BLtjZknFp+4SM pxOodclmoU5hbpg9MdLcCoHdsGKr1lVh8kt81QsOOEnTH6ytFiOkjhjmZjJALhHpfPMM ifBbDd6P3E7IIXn0Eg5USNPZ72tRDMC5l2mqMawlVcZ/u6TTIc11+Tcz56S59ZyLArYt 7FiQ== X-Gm-Message-State: AOJu0YxXbbgQCf8G2vtIASblKJtD/SkZBkX++g4C4W9bqJ/yaiXIvroc 5YBbb9M2zBne9fE9ZfDPM6n+RJ9RjKpNLppiS+q02G6+kb057ZCIbUy3yLKi2F3y X-Gm-Gg: ASbGnctgHKq7WRCi0YhHquP3TYLHGhMwDnumv8C3xEs86GksWFPH22mf/iIKphuP4Nv 70XkE3lTdOUsMi9fodAvZMQb+EwiymRWo1tamb0gcd0pnFJcDlx9B0i/K6VcQEa1XBqXXI0PDPR Gp9XgrEHCnMfBxBub0iD+6ZY8uKVDrB3wfsC6pTc1GFF+rgdOR3xNCERUDmt/mr6vSShZoKXNzU q0QR13b3a+iQEQYqtuHuoGAr4TIRzZ05aXLF462iPe4PM3nPOuLJB6jlJ++hRbxhFgjpaXeRvvY LdgtSdMf2I97CgwXs03hNdczEbM8MfY0tA42gzZ9TWEY+PtA6OvOwKIWo3/Ceeb//r26B0miprF hEHBD7Iv4uUw18sbBQLlHhMd2ZrLoiRk57XhSHVtNDx+bLzEvPS9GIDo1a4epw09eqv5/xf/nwe vn77DM0lJ+6O5Ul9vHBBk= X-Google-Smtp-Source: AGHT+IHQqx8x/rVKqs+2t//0+Q2VrAr9T8nHCb6DAwG7NkPhMMeaR8zV+ncTqyoxSpryLxrBPgFtrg== X-Received: by 2002:a05:600c:19c6:b0:475:ddad:c3a9 with SMTP id 5b1f17b1804b1-477a94fc3eamr23193965e9.13.1763461893297; Tue, 18 Nov 2025 02:31:33 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-477a81c567bsm55743925e9.9.2025.11.18.02.31.32 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 18 Nov 2025 02:31:32 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][scarthgap][PATCH 5/6] libwmf: patch CVE-2015-4696 Date: Tue, 18 Nov 2025 11:31:27 +0100 Message-ID: <20251118103128.1471091-5-skandigraun@gmail.com> X-Mailer: git-send-email 2.51.2 In-Reply-To: <20251118103128.1471091-1-skandigraun@gmail.com> References: <20251118103128.1471091-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 18 Nov 2025 10:31:39 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/121847 From: Gyorgy Sarvari via lists.openembedded.org Details: https://nvd.nist.gov/vuln/detail/CVE-2015-4696 Pick the patch that mentions the vulnerability ID explicitly. Signed-off-by: Gyorgy Sarvari --- .../libwmf/libwmf/CVE-2015-4696.patch | 37 +++++++++++++++++++ .../recipes-extended/libwmf/libwmf_0.2.8.4.bb | 1 + 2 files changed, 38 insertions(+) create mode 100644 meta-oe/recipes-extended/libwmf/libwmf/CVE-2015-4696.patch diff --git a/meta-oe/recipes-extended/libwmf/libwmf/CVE-2015-4696.patch b/meta-oe/recipes-extended/libwmf/libwmf/CVE-2015-4696.patch new file mode 100644 index 0000000000..bd5fc4d85f --- /dev/null +++ b/meta-oe/recipes-extended/libwmf/libwmf/CVE-2015-4696.patch @@ -0,0 +1,37 @@ +From f743ef455dfb1faade0ca5290994087ef8b12a98 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= +Date: Wed, 8 Aug 2018 14:00:49 +0100 +Subject: [PATCH] CVE-2015-4696 + +CVE: CVE-2015-4696 +Upstream-Status: Backport [https://github.com/caolanm/libwmf/commit/f47cbdf96838c2daa7b8e489f59e62371d33352a] +Signed-off-by: Gyorgy Sarvari +--- + src/player/meta.h | 5 ++++- + 1 file changed, 4 insertions(+), 1 deletion(-) + +diff --git a/src/player/meta.h b/src/player/meta.h +index 3e13688..f86c5f9 100644 +--- a/src/player/meta.h ++++ b/src/player/meta.h +@@ -2585,6 +2585,8 @@ static int meta_dc_restore (wmfAPI* API,wmfRecord* Record,wmfAttributes* attrlis + polyrect.BR[i] = clip->rects[i].BR; + } + ++ if (FR->region_clip) FR->region_clip (API,&polyrect); ++ + wmf_free (API,polyrect.TL); + wmf_free (API,polyrect.BR); + } +@@ -2593,9 +2595,10 @@ static int meta_dc_restore (wmfAPI* API,wmfRecord* Record,wmfAttributes* attrlis + polyrect.BR = 0; + + polyrect.count = 0; ++ ++ if (FR->region_clip) FR->region_clip (API,&polyrect); + } + +- if (FR->region_clip) FR->region_clip (API,&polyrect); + + return (changed); + } diff --git a/meta-oe/recipes-extended/libwmf/libwmf_0.2.8.4.bb b/meta-oe/recipes-extended/libwmf/libwmf_0.2.8.4.bb index 364bf4b022..e1f94172ae 100644 --- a/meta-oe/recipes-extended/libwmf/libwmf_0.2.8.4.bb +++ b/meta-oe/recipes-extended/libwmf/libwmf_0.2.8.4.bb @@ -21,6 +21,7 @@ SRC_URI = "${SOURCEFORGE_MIRROR}/wvware/${BPN}/${PV}/${BPN}-${PV}.tar.gz;name=ta file://0001-configure-use-pkg-config-for-freetype.patch \ file://CVE-2015-0848-CVE-2015-4588.patch \ file://CVE-2015-4695.patch \ + file://CVE-2015-4696.patch \ " SRC_URI[tarball.md5sum] = "d1177739bf1ceb07f57421f0cee191e0" From patchwork Tue Nov 18 10:31:28 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 74889 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E9BE1CED603 for ; Tue, 18 Nov 2025 10:31:39 +0000 (UTC) Received: from mail-wm1-f45.google.com (mail-wm1-f45.google.com [209.85.128.45]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.9363.1763461895764659555 for ; Tue, 18 Nov 2025 02:31:36 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=IBBoxhcv; spf=pass (domain: gmail.com, ip: 209.85.128.45, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f45.google.com with SMTP id 5b1f17b1804b1-4779a637712so19933125e9.1 for ; Tue, 18 Nov 2025 02:31:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1763461894; x=1764066694; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Ql8z3TRp1s2DUWZmZbG9KDyJfu4v4EnVuNorCIm6hNE=; b=IBBoxhcvFHuVLhzMLVnVRgw2E27pjdefDRKpiixdtiQgdIAMcMtHh0WuFjsMwELtpt wWn+7DjAs47rSNZ4xv2kR/tPqBoHcLPk5tLum224WjiVZBYo2AJ5XKWIo7sIJL97oqL1 399N4bTjc2hE7yrEiH5urZfpXiIhk49rGVt8dNpzI7cc1DNBf9spg2iW+4uaw2la0EbP n4IejxJEsLoHKVriJaxAkEIBNZg6+kpG3fKW0vL4bsALPTCFT15AC5jP9eg/h5g4QZmt J2pb7P4R7DWGmQIW32Ke18/Lm36nficxiBIqdGMzpTsTZOl30oSfXLFpVbzmEA9bTXdM oqgA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763461894; x=1764066694; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=Ql8z3TRp1s2DUWZmZbG9KDyJfu4v4EnVuNorCIm6hNE=; b=JOQ0+EWAKm8plENQCU6sLGy39ic3bNmbzzRjwZWqmuJiib1+V6GtIVozoO3ajmYfmV TB2A3HfUngjTK5zGAOnDHKdKZ1IP5HbMTc7rWR53T0S6T0V34SuiH+DW9DiZmFCuHUMy lI0w/GXjl3jmFBFd3cRY3rTF87HZVZalOZgKbYjhpHfww6EXgkHSewKgTCKnVCQnbYxx WMIhjsIztKbGwOQjIjblS+uAvRYLaqx4wHIV20OJR8O7+zoq6td/YRZSGFxSzZpPvw5W 3R4L3G97ihScPXtKVhZfDggM4vwBj/IPNawWf7r5/lxRp42lBf5nyQBFasrKjpRTpD5J 4BBQ== X-Gm-Message-State: AOJu0YyWk5vVDRoXDEmzENX0MzZ24c2D5w4x64owBTRbO7Qb6cv8n3ec FNt7EVMB71T6xr0GUBRqqLjTxD5uZWIDiDjLyJpX1rQLsOBhsrsKf1Sk71+/PLMv X-Gm-Gg: ASbGncsKMFTvYNY30T566Q9Y1LiJ7MPACPv+3d96vw7IE4Ew7g9JbNy4+YwfomuSxIC DiWLUqZlH+S+HRgirg1p2za2zocq3zmQMD0UrizeDAE9sjvI6HUy4czMXTTI9J4AlhMjN8FOQyN IRLBBZ9qOvu49xegstdTfplP/ac3xklRVKTAHQfJwDgZaI0VDXsRsTvNWhnlvWI0CGwakt+zc5K WIzOAJDTk7PNXdzrzsPMLq3/kfkbxhdnoKVK2bkWupVNZCvSvVa6AK9b/31nDJAmM4oP/Ymm8Z6 Vi7EanKSCKy0wL95WpHQ4Bt7WJjSNUSYArP/FDSqWiZiFKcLAhV7ul7KcSfEEGLU46tjvg74i8f aEyWSPRXN1GJb8M96S2qiiwsjAd0aQrM9dAxsjnbtvkH7RIWHxHA/ty7/Mk9+wK2pboN4rsxNt/ bQ/WW6n96o X-Google-Smtp-Source: AGHT+IHTOI9PyMLql0seXoESVEcoKkiBraOsLsxNfJPtTr2arXxTEww82mcgUqtpvmph8G5KEbyBnA== X-Received: by 2002:a05:600c:6287:b0:477:632c:5b91 with SMTP id 5b1f17b1804b1-4778fe5fabbmr191010885e9.16.1763461893946; Tue, 18 Nov 2025 02:31:33 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-477a81c567bsm55743925e9.9.2025.11.18.02.31.33 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 18 Nov 2025 02:31:33 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][scarthgap][PATCH 6/6] libwmf: patch CVE-2016-9011 Date: Tue, 18 Nov 2025 11:31:28 +0100 Message-ID: <20251118103128.1471091-6-skandigraun@gmail.com> X-Mailer: git-send-email 2.51.2 In-Reply-To: <20251118103128.1471091-1-skandigraun@gmail.com> References: <20251118103128.1471091-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 18 Nov 2025 10:31:39 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/121848 From: Gyorgy Sarvari via lists.openembedded.org Details: https://nvd.nist.gov/vuln/detail/CVE-2016-9011 Pick the patch that explicitly mentions the vulnerability ID. Signed-off-by: Gyorgy Sarvari --- .../libwmf/libwmf/CVE-2016-9011.patch | 50 +++++++++++++++++++ .../recipes-extended/libwmf/libwmf_0.2.8.4.bb | 1 + 2 files changed, 51 insertions(+) create mode 100644 meta-oe/recipes-extended/libwmf/libwmf/CVE-2016-9011.patch diff --git a/meta-oe/recipes-extended/libwmf/libwmf/CVE-2016-9011.patch b/meta-oe/recipes-extended/libwmf/libwmf/CVE-2016-9011.patch new file mode 100644 index 0000000000..e2044bc3e6 --- /dev/null +++ b/meta-oe/recipes-extended/libwmf/libwmf/CVE-2016-9011.patch @@ -0,0 +1,50 @@ +From 245ec5c80d8d9964d150507f5583ab890a327fe8 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= +Date: Wed, 8 Aug 2018 14:01:34 +0100 +Subject: [PATCH] CVE-2016-9011 + +CVE: CVE-2016-9011 +Upstream-Status: Backport [https://github.com/caolanm/libwmf/commit/2208b4881ceb8056480735dc330cfd52be03893e] +Signed-off-by: Gyorgy Sarvari +--- + src/player.c | 27 +++++++++++++++++++++++++-- + 1 file changed, 25 insertions(+), 2 deletions(-) + +diff --git a/src/player.c b/src/player.c +index cd87cb5..628cdcb 100644 +--- a/src/player.c ++++ b/src/player.c +@@ -139,8 +139,31 @@ wmf_error_t wmf_scan (wmfAPI* API,unsigned long flags,wmfD_Rect* d_r) + WMF_DEBUG (API,"bailing..."); + return (API->err); + } +- +- P->Parameters = (unsigned char*) wmf_malloc (API,(MAX_REC_SIZE(API) ) * 2 * sizeof (unsigned char)); ++ ++ U32 nMaxRecordSize = (MAX_REC_SIZE(API) ) * 2 * sizeof (unsigned char); ++ if (nMaxRecordSize) ++ { ++ //before allocating memory do a sanity check on size by seeking ++ //to claimed end to see if its possible. We're constrained here ++ //by the api and existing implementations to not simply seeking ++ //to SEEK_END. So use what we have to skip to the last byte and ++ //try and read it. ++ const long nPos = WMF_TELL (API); ++ WMF_SEEK (API, nPos + nMaxRecordSize - 1); ++ if (ERR (API)) ++ { WMF_DEBUG (API,"bailing..."); ++ return (API->err); ++ } ++ int byte = WMF_READ (API); ++ if (byte == (-1)) ++ { WMF_ERROR (API,"Unexpected EOF!"); ++ API->err = wmf_E_EOF; ++ return (API->err); ++ } ++ WMF_SEEK (API, nPos); ++ } ++ ++ P->Parameters = (unsigned char*) wmf_malloc (API, nMaxRecordSize); + + if (ERR (API)) + { WMF_DEBUG (API,"bailing..."); diff --git a/meta-oe/recipes-extended/libwmf/libwmf_0.2.8.4.bb b/meta-oe/recipes-extended/libwmf/libwmf_0.2.8.4.bb index e1f94172ae..381833b812 100644 --- a/meta-oe/recipes-extended/libwmf/libwmf_0.2.8.4.bb +++ b/meta-oe/recipes-extended/libwmf/libwmf_0.2.8.4.bb @@ -22,6 +22,7 @@ SRC_URI = "${SOURCEFORGE_MIRROR}/wvware/${BPN}/${PV}/${BPN}-${PV}.tar.gz;name=ta file://CVE-2015-0848-CVE-2015-4588.patch \ file://CVE-2015-4695.patch \ file://CVE-2015-4696.patch \ + file://CVE-2016-9011.patch \ " SRC_URI[tarball.md5sum] = "d1177739bf1ceb07f57421f0cee191e0"