Package: tiff / 3.9.4-5+squeeze14
Metadata
Package | Version | Patches format |
---|---|---|
tiff | 3.9.4-5+squeeze14 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
libtiff scanlinesize.patch | (download) |
libtiff/tif_jpeg.c |
14 10 + 4 - 0 ! |
fix mishandling of downsampled jpeg files |
soname.patch | (download) |
libtiff/Makefile.am |
4 2 + 2 - 0 ! |
--- |
man errors.patch | (download) |
man/TIFFClose.3tiff |
2 1 + 1 - 0 ! |
--- |
man spelling.patch | (download) |
man/TIFFReadDirectory.3tiff |
8 4 + 4 - 0 ! |
fix common spelling errors in manual page (lintian) |
tif_getimage.c CVE 2010 2233.patch | (download) |
libtiff/tif_getimage.c |
10 6 + 4 - 0 ! |
fix specific tif_getimage failure on 64-bit platforms |
fix ycbcr oob read.patch | (download) |
libtiff/tif_getimage.c |
2 1 + 1 - 0 ! |
fix crash on oob reads in putcontig8bitycbcr11tile Fixed upstream in CVS version 1.63.2.5 of libtiff/tif_getimage.c Bug-Ubuntu: https://bugs.launchpad.net/bugs/591605 Bug-RedHat: https://bugzilla.redhat.com/show_bug.cgi?id=603081 Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=595064 |
CVE 2010 2482.patch | (download) |
libtiff/tif_ojpeg.c |
6 6 + 0 - 0 ! |
fix denial of service via invalid td_stripbytecount field |
CVE 2010 2595.patch | (download) |
libtiff/tif_color.c |
13 9 + 4 - 0 ! |
fix denial of service via invalid referenceblackwhite values |
CVE 2010 2597.patch | (download) |
libtiff/tif_strip.c |
18 9 + 9 - 0 ! |
fix denial of service via devide-by-zero |
CVE 2010 2630.patch | (download) |
libtiff/tif_dirread.c |
10 6 + 4 - 0 ! |
fix denial of service via out-of-order tags |
CVE 2011 0192.patch | (download) |
libtiff/tif_fax3.h |
6 6 + 0 - 0 ! |
cve-2011-0192: buffer overflow in fax4decode |
CVE 2011 1167.patch | (download) |
libtiff/tif_thunder.c |
36 30 + 6 - 0 ! |
correct buffer overflow with thunder encoded files |
CVE 2009 5022.patch | (download) |
libtiff/tif_ojpeg.c |
6 5 + 1 - 0 ! |
--- |
CVE 2010 4665.patch | (download) |
tools/tiffdump.c |
9 7 + 2 - 0 ! |
fix denial of service and possible code execution via tiffdump |
CVE 2012 1173.patch | (download) |
libtiff/tif_getimage.c |
20 16 + 4 - 0 ! |
fix arbitrary code execution via size overflow |
CVE 2012 2088.patch | (download) |
libtiff/tif_strip.c |
29 22 + 7 - 0 ! |
fix possible arbitrary code execution via buffer overflow due to type-conversion flaw |
CVE 2012 2113.patch | (download) |
tools/tiff2pdf.c |
134 108 + 26 - 0 ! |
fix possible arbitrary code execution via integer overflows in tiff2pdf |
CVE 2012 3401.patch | (download) |
tools/tiff2pdf.c |
1 1 + 0 - 0 ! |
fix possible arbitrary code execution via heap overflow in tiff2pdf. |
CVE 2012 4447.patch | (download) |
libtiff/tif_pixarlog.c |
2 1 + 1 - 0 ! |
--- |
CVE 2012 4564.patch | (download) |
tools/ppm2tiff.c |
13 11 + 2 - 0 ! |
--- |
CVE 2012 5581.patch | (download) |
libtiff/tif_dir.c |
277 137 + 140 - 0 ! |
* libtiff/tif_dir.c, tif_print.c : remove field_custom handling for PAGENUMBER, HALFTONEHINTS, and YCBCRSUBSAMPLING. Implement DOTRANGE |
CVE 2013 1960.patch | (download) |
tools/tiff2pdf.c |
103 62 + 41 - 0 ! |
--- |
CVE 2013 1961.patch | (download) |
contrib/dbs/xtiff/xtiff.c |
4 2 + 2 - 0 ! |
--- |
CVE 2013 4231.patch | (download) |
tools/gif2tiff.c |
2 2 + 0 - 0 ! |
buffer overflow in gif2tiff Bug: http://bugzilla.maptools.org/show_bug.cgi?id=2450 Bug-Debian: http://bugs.debian.org/719303 |
CVE 2013 4232.patch | (download) |
tools/tiff2pdf.c |
3 2 + 1 - 0 ! |
use after free in tiff2pdf Bug: http://bugzilla.maptools.org/show_bug.cgi?id=2449 Bug-Debian: http://bugs.debian.org/719303 |
CVE 2013 4244.patch | (download) |
tools/gif2tiff.c |
4 4 + 0 - 0 ! |
oob write in gif2tiff Bug-Redhat: https://bugzilla.redhat.com/show_bug.cgi?id=996468 |
CVE 2013 4243.patch | (download) |
tools/gif2tiff.c |
12 12 + 0 - 0 ! |
--- |
CVE 2014 8128 1.patch | (download) |
tools/thumbnail.c |
8 7 + 1 - 0 ! |
[patch] * tools/thumbnail.c: fix out-of-buffer write http://bugzilla.maptools.org/show_bug.cgi?id=2489 (CVE-2014-8128) |
CVE 2014 8128 2.patch | (download) |
tools/thumbnail.c |
21 20 + 1 - 0 ! |
[patch] * tools/thumbnail.c, tools/tiffcmp.c: only read/write TIFFTAG_GROUP3OPTIONS or TIFFTAG_GROUP4OPTIONS if compression is COMPRESSION_CCITTFAX3 or COMPRESSION_CCITTFAX4 http://bugzilla.maptools.org/show_bug.cgi?id=2493 (CVE-2014-8128) |
CVE 2014 8128 3.patch | (download) |
tools/tiff2pdf.c |
10 9 + 1 - 0 ! |
[patch] * tools/tiff2pdf.c: check return code of tiffgetfield() when reading TIFFTAG_SAMPLESPERPIXEL [benh: Backported to 3.9.4: adjust context] |
CVE 2014 8128 4.patch | (download) |
tools/tiffdither.c |
24 18 + 6 - 0 ! |
--- |
CVE 2014 8128 5 fixed.patch | (download) |
libtiff/tif_dirinfo.c |
4 4 + 0 - 0 ! |
backport of: fix out-of-bounds write in thumbnail and tiffcmp tools |
CVE 2014 8129.patch | (download) |
libtiff/tif_next.c |
17 17 + 0 - 0 ! |
[patch] * libtiff/tif_next.c: check that bitspersample = 2. fixes http://bugzilla.maptools.org/show_bug.cgi?id=2487 (CVE-2014-8129) [benh: Backported to 3.9.4: adjust context] |
CVE 2014 9655.patch | (download) |
libtiff/tif_getimage.c |
12 7 + 5 - 0 ! |
[patch] * libtiff/tif_next.c: add new tests to check that we don't read outside of the compressed input stream buffer. * libtiff/tif_getimage.c: in OJPEG case, fix checks on strile width/height [benh: Backported to 3.9.4: adjust context] |
fix various crasher bugs on fuzzed images.patch | (download) |
libtiff/tif_dir.c |
21 19 + 2 - 0 ! |
Fix various crasher bugs on fuzzed images. * libtiff/tif_dir.c: TIFFSetField(): refuse to set negative values for TIFFTAG_XRESOLUTION and TIFFTAG_YRESOLUTION that cause asserts when writing the directory * libtiff/tif_dirread.c: TIFFReadDirectory(): refuse to read ColorMap or TransferFunction if BitsPerSample has not yet been read, otherwise reading it later will cause user code to crash if BitsPerSample > 1 * libtiff/tif_getimage.c: TIFFRGBAImageOK(): return FALSE if LOGLUV with SamplesPerPixel != 3, or if CIELAB with SamplesPerPixel != 3 or BitsPerSample != 8 * libtiff/tif_next.c: in the "run mode", use tilewidth for tiled images instead of imagewidth to avoid crash * tools/bmp2tiff.c: fix crash due to int overflow related to input BMP dimensions * tools/tiff2pdf.c: fix crash due to invalid tile count (should likely be checked by libtiff too). Detect invalid settings of BitsPerSample/SamplesPerPixel for CIELAB / ITULAB * tools/tiffcrop.c: fix crash due to invalid TileWidth/TileHeight * tools/tiffdump.c: fix crash due to overflow of entry count. . [This covers part of CVE-2014-8128, part of CVE-2014-8129, and CVE-2014-9330] . [benh: Backported to 3.9.4: - Drop changes to ChangeLog - Drop changes to tiffdump.c, not applicable to this version - s/\bTIFFField\b/TIFFFieldInfo/ - Adjust context] |
tools pal2rgb.c tools thumbnail.c fix crash by disab.patch | (download) |
tools/pal2rgb.c |
2 1 + 1 - 0 ! |
* tools/pal2rgb.c, tools/thumbnail.c: fix crash by disabling TIFFTAG_INKNAMES copying. The right fix would be to properly copy it, but not worth the burden for those esoteric utilities. http://bugzilla.maptools.org/show_bug.cgi?id=2484 (CVE-2014-8127) . [benh: Backported to 3.9.4: drop changes to ChangeLog] |
tools tiff2bw.c when photometric rgb the utility onl.patch | (download) |
tools/tiff2bw.c |
5 5 + 0 - 0 ! |
* tools/tiff2bw.c: when Photometric=RGB, the utility only works if SamplesPerPixel = 3. Enforce that http://bugzilla.maptools.org/show_bug.cgi?id=2485 (CVE-2014-8127) . [benh: Backported to 3.9.4: drop changes to ChangeLog] |
CVE 2015 8665_and_CVE 2015 8683.patch | (download) |
libtiff/tif_getimage.c |
41 33 + 8 - 0 ! |
[patch] * libtiff/tif_getimage.c: fix out-of-bound reads in TIFFRGBAImage interface in case of unsupported values of SamplesPerPixel/ExtraSamples for LogLUV / CIELab. Add explicit call to TIFFRGBAImageOK() in TIFFRGBAImageBegin(). Fix CVE-2015-8665 reported by limingxing and CVE-2015-8683 reported by zzf of Alibaba. |
CVE 2015 8781.patch | (download) |
libtiff/tif_luv.c |
55 46 + 9 - 0 ! |
fix potential out-of-bound reads/writes in decode functions in tif_luv.c Patch adapted from upstream commit aaab5c3c9d2a2c6984f23ccbc79702610439bc65 Fixes CVE-2015-8781, CVE-2015-8782, CVE-2015-8783 (bugzilla #2522) |
CVE 2015 8784.patch | (download) |
libtiff/tif_next.c |
11 9 + 2 - 0 ! |
fix cve-2015-8784: potential out-of-bound write in nextdecode() Patch adopted from upstream commit b18012dae552f85dcc5c57d3bf4e997a15b1cc1c triggered by http://lcamtuf.coredump.cx/afl/vulns/libtiff5.tif Bug: http://bugzilla.maptools.org/show_bug.cgi?id=2508 |