Blame SOURCES/0009-CVE-2022-3970-TIFFReadRGBATileExt-fix-unsigned-integ.patch

1e79a1
From b6204fada53418fdf140e039e87052f987770de1 Mon Sep 17 00:00:00 2001
1e79a1
From: Even Rouault <even.rouault@spatialys.com>
1e79a1
Date: Tue, 8 Nov 2022 15:16:58 +0100
1e79a1
Subject: [PATCH] (CVE-2022-3970) TIFFReadRGBATileExt(): fix (unsigned) integer
1e79a1
 overflow on strips/tiles > 2 GB
1e79a1
1e79a1
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53137
1e79a1
1e79a1
(cherry picked from commit 227500897dfb07fb7d27f7aa570050e62617e3be)
1e79a1
---
1e79a1
 libtiff/tif_getimage.c | 8 ++++----
1e79a1
 1 file changed, 4 insertions(+), 4 deletions(-)
1e79a1
1e79a1
diff --git a/libtiff/tif_getimage.c b/libtiff/tif_getimage.c
1e79a1
index a1b6570b..9a2e0c59 100644
1e79a1
--- a/libtiff/tif_getimage.c
1e79a1
+++ b/libtiff/tif_getimage.c
1e79a1
@@ -3058,15 +3058,15 @@ TIFFReadRGBATileExt(TIFF* tif, uint32_t col, uint32_t row, uint32_t * raster, in
1e79a1
         return( ok );
1e79a1
 
1e79a1
     for( i_row = 0; i_row < read_ysize; i_row++ ) {
1e79a1
-        memmove( raster + (tile_ysize - i_row - 1) * tile_xsize,
1e79a1
-                 raster + (read_ysize - i_row - 1) * read_xsize,
1e79a1
+        memmove( raster + (size_t)(tile_ysize - i_row - 1) * tile_xsize,
1e79a1
+                 raster + (size_t)(read_ysize - i_row - 1) * read_xsize,
1e79a1
                  read_xsize * sizeof(uint32_t) );
1e79a1
-        _TIFFmemset( raster + (tile_ysize - i_row - 1) * tile_xsize+read_xsize,
1e79a1
+        _TIFFmemset( raster + (size_t)(tile_ysize - i_row - 1) * tile_xsize+read_xsize,
1e79a1
                      0, sizeof(uint32_t) * (tile_xsize - read_xsize) );
1e79a1
     }
1e79a1
 
1e79a1
     for( i_row = read_ysize; i_row < tile_ysize; i_row++ ) {
1e79a1
-        _TIFFmemset( raster + (tile_ysize - i_row - 1) * tile_xsize,
1e79a1
+        _TIFFmemset( raster + (size_t)(tile_ysize - i_row - 1) * tile_xsize,
1e79a1
                      0, sizeof(uint32_t) * tile_xsize );
1e79a1
     }
1e79a1