Package: tiff / 4.0.3-12.3+deb8u5
Metadata
Package | Version | Patches format |
---|---|---|
tiff | 4.0.3-12.3+deb8u5 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
opengl.patch | (download) |
tools/tiffgt.c |
1 1 + 0 - 0 ! |
call glflush() in tiffgt |
CVE 2012 4564.patch | (download) |
tools/ppm2tiff.c |
13 11 + 2 - 0 ! |
--- |
CVE 2013 1960.patch | (download) |
tools/tiff2pdf.c |
103 62 + 41 - 0 ! |
--- |
CVE 2013 1961.patch | (download) |
contrib/dbs/xtiff/xtiff.c |
4 2 + 2 - 0 ! |
--- |
CVE 2013 4231.patch | (download) |
tools/gif2tiff.c |
2 2 + 0 - 0 ! |
buffer overflow in gif2tiff Bug: http://bugzilla.maptools.org/show_bug.cgi?id=2450 Bug-Debian: http://bugs.debian.org/719303 |
CVE 2013 4232.patch | (download) |
tools/tiff2pdf.c |
3 2 + 1 - 0 ! |
use after free in tiff2pdf Bug: http://bugzilla.maptools.org/show_bug.cgi?id=2449 Bug-Debian: http://bugs.debian.org/719303 |
CVE 2013 4244.patch | (download) |
tools/gif2tiff.c |
4 4 + 0 - 0 ! |
oob write in gif2tiff Bug-Redhat: https://bugzilla.redhat.com/show_bug.cgi?id=996468 |
CVE 2013 4243.patch | (download) |
tools/gif2tiff.c |
12 12 + 0 - 0 ! |
--- |
jpeg colorspace.patch | (download) |
tools/tiffcp.c |
6 6 + 0 - 0 ! |
fix for debian bug #741451 |
CVE 2014 9330.patch | (download) |
tools/bmp2tiff.c |
17 16 + 1 - 0 ! |
cve-2014-9330 Integer overflow in bmp2tiff |
CVE 2014 8127 1.patch | (download) |
tools/tiff2bw.c |
5 5 + 0 - 0 ! |
[patch] * tools/tiff2bw.c: when photometric=rgb, the utility only works if SamplesPerPixel = 3. Enforce that http://bugzilla.maptools.org/show_bug.cgi?id=2485 (CVE-2014-8127) |
CVE 2014 8127 2.patch | (download) |
tools/pal2rgb.c |
2 1 + 1 - 0 ! |
[patch] * tools/pal2rgb.c, tools/thumbnail.c: fix crash by disabling TIFFTAG_INKNAMES copying. The right fix would be to properly copy it, but not worth the burden for those esoteric utilities. http://bugzilla.maptools.org/show_bug.cgi?id=2484 (CVE-2014-8127) |
CVE 2014 8127 3.patch | (download) |
libtiff/tif_read.c |
6 3 + 3 - 0 ! |
[patch] * libtiff/tif_read.c: fix several invalid comparisons of a uint64 value with <= 0 by casting it to int64 first. This solves crashing bug on corrupted images generated by afl. |
CVE 2014 8127 4.patch | (download) |
libtiff/tif_dir.c |
21 19 + 2 - 0 ! |
[patch] fix various crasher bugs on fuzzed images. * libtiff/tif_dir.c: TIFFSetField(): refuse to set negative values for TIFFTAG_XRESOLUTION and TIFFTAG_YRESOLUTION that cause asserts when writing the directory * libtiff/tif_dirread.c: TIFFReadDirectory(): refuse to read ColorMap or TransferFunction if BitsPerSample has not yet been read, otherwise reading it later will cause user code to crash if BitsPerSample > 1 * libtiff/tif_getimage.c: TIFFRGBAImageOK(): return FALSE if LOGLUV with SamplesPerPixel != 3, or if CIELAB with SamplesPerPixel != 3 or BitsPerSample != 8 * libtiff/tif_next.c: in the "run mode", use tilewidth for tiled images instead of imagewidth to avoid crash * tools/bmp2tiff.c: fix crash due to int overflow related to input BMP dimensions * tools/tiff2pdf.c: fix crash due to invalid tile count (should likely be checked by libtiff too). Detect invalid settings of BitsPerSample/SamplesPerPixel for CIELAB / ITULAB * tools/tiffcrop.c: fix crash due to invalid TileWidth/TileHeight * tools/tiffdump.c: fix crash due to overflow of entry count. |
CVE 2014 8128 1.patch | (download) |
tools/thumbnail.c |
8 7 + 1 - 0 ! |
[patch] * tools/thumbnail.c: fix out-of-buffer write http://bugzilla.maptools.org/show_bug.cgi?id=2489 (CVE-2014-8128) |
CVE 2014 8128 2.patch | (download) |
tools/thumbnail.c |
21 20 + 1 - 0 ! |
[patch] * tools/thumbnail.c, tools/tiffcmp.c: only read/write TIFFTAG_GROUP3OPTIONS or TIFFTAG_GROUP4OPTIONS if compression is COMPRESSION_CCITTFAX3 or COMPRESSION_CCITTFAX4 http://bugzilla.maptools.org/show_bug.cgi?id=2493 (CVE-2014-8128) |
CVE 2014 8128 3.patch | (download) |
tools/tiff2pdf.c |
10 9 + 1 - 0 ! |
[patch] * tools/tiff2pdf.c: check return code of tiffgetfield() when reading TIFFTAG_SAMPLESPERPIXEL |
CVE 2014 8129.patch | (download) |
libtiff/tif_next.c |
17 17 + 0 - 0 ! |
[patch] * libtiff/tif_next.c: check that bitspersample = 2. fixes http://bugzilla.maptools.org/show_bug.cgi?id=2487 (CVE-2014-8129) |
CVE 2014 9655.patch | (download) |
libtiff/tif_getimage.c |
12 7 + 5 - 0 ! |
[patch] * libtiff/tif_next.c: add new tests to check that we don't read outside of the compressed input stream buffer. * libtiff/tif_getimage.c: in OJPEG case, fix checks on strile width/height |
CVE 2014 8128 4.patch | (download) |
tools/tiffdither.c |
21 16 + 5 - 0 ! |
--- |
CVE 2014 8128 5.patch | (download) |
libtiff/tif_dirinfo.c |
2 2 + 0 - 0 ! |
--- |
CVE 2015 8665_and_CVE 2015 8683.patch | (download) |
ChangeLog |
8 8 + 0 - 0 ! |
[patch] * libtiff/tif_getimage.c: fix out-of-bound reads in TIFFRGBAImage interface in case of unsupported values of SamplesPerPixel/ExtraSamples for LogLUV / CIELab. Add explicit call to TIFFRGBAImageOK() in TIFFRGBAImageBegin(). Fix CVE-2015-8665 reported by limingxing and CVE-2015-8683 reported by zzf of Alibaba. |
CVE 2015 8781_CVE 2015 8782_CVE 2015 8783.patch | (download) |
ChangeLog |
7 7 + 0 - 0 ! |
[patch] * libtiff/tif_luv.c: fix potential out-of-bound writes in decode functions in non debug builds by replacing assert()s by regular if checks (bugzilla #2522). Fix potential out-of-bound reads in case of short input data. |
CVE 2015 8784.patch | (download) |
ChangeLog |
6 6 + 0 - 0 ! |
[patch] * libtiff/tif_next.c: fix potential out-of-bound write in NeXTDecode() triggered by http://lcamtuf.coredump.cx/afl/vulns/libtiff5.tif (bugzilla #2508) |
CVE 2016 5314_CVE 2016 5316_CVE 2016 5320_CVE 2016 5875.patch | (download) |
ChangeLog |
5 5 + 0 - 0 ! |
[patch] * libtiff/tif_pixarlog.c: fix potential buffer write overrun in PixarLogDecode() on corrupted/unexpected images (reported by Mathias Svensson) |
CVE 2016 6223.patch | (download) |
ChangeLog |
7 7 + 0 - 0 ! |
[patch] * libtiff/tif_read.c: fix out-of-bounds read on memory-mapped files in TIFFReadRawStrip1() and TIFFReadRawTile1() when stripoffset is beyond tmsize_t max value (reported by Mathias Svensson) |
CVE 2016 5321.patch | (download) |
ChangeLog |
7 7 + 0 - 0 ! |
--- |
CVE 2016 5323.patch | (download) |
ChangeLog |
2 1 + 1 - 0 ! |
--- |
CVE 2016 3945.patch | (download) |
ChangeLog |
8 8 + 0 - 0 ! |
--- |
CVE 2016 3990.patch | (download) |
ChangeLog |
10 9 + 1 - 0 ! |
--- |
CVE 2016 3991_CVE 2016 5322.patch | (download) |
ChangeLog |
6 6 + 0 - 0 ! |
--- |
CVE 2016 3623_CVE 2016 3624.patch | (download) |
ChangeLog |
5 5 + 0 - 0 ! |
--- |
CVE 2016 9533_CVE 2016 9534_CVE 2016 9535_CVE 2016 9536_CVE 2016 9537.patch | (download) |
ChangeLog |
23 23 + 0 - 0 ! |
[patch] * tools/tiffcrop.c: fix various out-of-bounds write vulnerabilities in heap or stack allocated buffers. Reported as MSVR 35093, MSVR 35096 and MSVR 35097. Discovered by Axel Souchet and Vishal Chauhan from the MSRC Vulnerabilities & Mitigations team. * tools/tiff2pdf.c: fix out-of-bounds write vulnerabilities in heap allocate buffer in t2p_process_jpeg_strip(). Reported as MSVR 35098. Discovered by Axel Souchet and Vishal Chauhan from the MSRC Vulnerabilities & Mitigations team. * libtiff/tif_pixarlog.c: fix out-of-bounds write vulnerabilities in heap allocated buffers. Reported as MSVR 35094. Discovered by Axel Souchet and Vishal Chauhan from the MSRC Vulnerabilities & Mitigations team. * libtiff/tif_write.c: fix issue in error code path of TIFFFlushData1() that didn't reset the tif_rawcc and tif_rawcp members. I'm not completely sure if that could happen in practice outside of the odd behaviour of t2p_seekproc() of tiff2pdf). The report points that a better fix could be to check the return value of TIFFFlushData1() in places where it isn't done currently, but it seems this patch is enough. Reported as MSVR 35095. Discovered by Axel Souchet & Vishal Chauhan & Suha Can from the MSRC Vulnerabilities & Mitigations team. |
CVE 2016 3622.patch | (download) |
ChangeLog |
9 9 + 0 - 0 ! |
[patch] * libtiff/tif_getimage.c (tiffrgbaimageok): reject attempts to read floating point images. * libtiff/tif_predict.c (PredictorSetup): Enforce bits-per-sample requirements of floating point predictor (3). Fixes CVE-2016-3622 "Divide By Zero in the tiff2rgba tool." places where it isn't done currently, but it seems this patch is enough. |
CVE 2016 9538.patch | (download) |
ChangeLog |
9 9 + 0 - 0 ! |
[patch] * tools/tiffcp.c: fix read of undefined variable in case of missing required tags. Found on test case of MSVR 35100. * tools/tiffcrop.c: fix read of undefined buffer in readContigStripsIntoBuffer() due to uint16 overflow. Probably not a security issue but I can be wrong. Reported as MSVR 35100 by Axel Souchet from the MSRC Vulnerabilities & Mitigations team. |
CVE 2016 9540.patch | (download) |
ChangeLog |
7 7 + 0 - 0 ! |
[patch] * tools/tiffcp.c: fix out-of-bounds write on tiled images with odd tile width vs image width. Reported as MSVR 35103 by Axel Souchet and Vishal Chauhan from the MSRC Vulnerabilities & Mitigations team. |
CVE 2016 5652.patch | (download) |
ChangeLog |
7 7 + 0 - 0 ! |
[patch] * tools/tiff2pdf.c: fix write buffer overflow of 2 bytes on JPEG compressed images. Reported by Tyler Bohan of Cisco Talos as TALOS-CAN-0187 / CVE-2016-5652. Also prevents writing 2 extra uninitialized bytes to the file stream. |
CVE 2016 9273.patch | (download) |
ChangeLog |
8 8 + 0 - 0 ! |
[patch] * libtiff/tif_strip.c: make tiffnumberofstrips() return the td->td_nstrips value when it is non-zero, instead of recomputing it. This is needed in TIFF_STRIPCHOP mode where td_nstrips is modified. Fixes a read outsize of array in tiffsplit (or other utilities using TIFFNumberOfStrips()). Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2587 |
CVE 2016 9532.patch | (download) |
ChangeLog |
8 8 + 0 - 0 ! |
[patch] * tools/tiffcrop.c: fix multiple uint32 overflows in writeBufferToSeparateStrips(), writeBufferToContigTiles() and writeBufferToSeparateTiles() that could cause heap buffer overflows. Reported by Henri Salo from Nixu Corporation. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2592 |
CVE 2016 9297.patch | (download) |
ChangeLog |
8 8 + 0 - 0 ! |
[patch] * libtiff/tif_dirread.c: in tifffetchnormaltag(), make sure that values of tags with TIFF_SETGET_C16_ASCII / TIFF_SETGET_C32_ASCII access are null terminated, to avoid potential read outside buffer in _TIFFPrintField(). Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2590 |
CVE 2016 9448.patch | (download) |
ChangeLog |
9 9 + 0 - 0 ! |
[patch] * libtiff/tif_dirread.c: in tifffetchnormaltag(), do not dereference NULL pointer when values of tags with TIFF_SETGET_C16_ASCII / TIFF_SETGET_C32_ASCII access are 0-byte arrays. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2593 (regression introduced by previous fix done on 2016-11-11 for CVE-2016-9297). Reported by Henri Salo. |
CVE 2016 10092.patch | (download) |
ChangeLog |
7 7 + 0 - 0 ! |
[patch] * tools/tiffcrop.c: fix readcontigstripsintobuffer() in -i (ignore) mode so that the output buffer is correctly incremented to avoid write outside bounds. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2620 |
CVE 2016 10093.patch | (download) |
ChangeLog |
7 7 + 0 - 0 ! |
[patch] * tools/tiffcp.c: fix uint32 underflow/overflow that can cause heap-based buffer overflow. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2610 |
CVE 2016 10094.patch | (download) |
ChangeLog |
6 6 + 0 - 0 ! |
[patch] * tools/tiff2pdf.c: avoid potential heap-based overflow in t2p_readwrite_pdf_image_tile(). Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2640 |
CVE 2014 8127_CVE 2016 3658.patch | (download) |
ChangeLog |
19 19 + 0 - 0 ! |
[patch] * libtiff/tif_dir.c: discard values of sminsamplevalue and SMaxSampleValue when they have been read and the value of SamplesPerPixel is changed afterwards (like when reading a OJPEG compressed image with a missing SamplesPerPixel tag, and whose photometric is RGB or YCbCr, forcing SamplesPerPixel being 3). Otherwise when rewriting the directory (for example with tiffset, we will expect 3 values whereas the array had been allocated with just one), thus causing a out of bound read access. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2500 (CVE-2014-8127, duplicate: CVE-2016-3658) * libtiff/tif_write.c: avoid null pointer dereference on td_stripoffset when writing directory, if FIELD_STRIPOFFSETS was artificially set for a hack case in OJPEG case. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2500 (CVE-2014-8127, duplicate: CVE-2016-3658) |
CVE 2016 9535_part1.patch | (download) |
ChangeLog |
9 9 + 0 - 0 ! |
[patch] * libtiff/tif_predict.h, libtiff/tif_predict.c: replace assertions by runtime checks to avoid assertions in debug mode, or buffer overflows in release mode. Can happen when dealing with unusual tile size like YCbCr with subsampling. Reported as MSVR 35105 by Axel Souchet & Vishal Chauhan from the MSRC Vulnerabilities & Mitigations team. |
CVE 2016 9535_part2.patch | (download) |
ChangeLog |
5 5 + 0 - 0 ! |
[patch] * libtiff/tif_predic.c: fix memory leaks in error code paths added in previous commit (fix for MSVR 35105) |
CVE 2016 10266.patch | (download) |
ChangeLog |
7 7 + 0 - 0 ! |
[patch] * libtiff/tif_read.c, libtiff/tiffiop.h: fix uint32 overflow in TIFFReadEncodedStrip() that caused an integer division by zero. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2596 |
CVE 2016 10269.patch | (download) |
ChangeLog |
10 10 + 0 - 0 ! |
[patch] * libtiff/tif_pixarlog.c, libtiff/tif_luv.c: fix heap-based buffer overflow on generation of PixarLog / LUV compressed files, with ColorMap, TransferFunction attached and nasty plays with bitspersample. The fix for LUV has not been tested, but suffers from the same kind of issue of PixarLog. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2604 |
CVE 2016 10270.patch | (download) |
ChangeLog |
15 15 + 0 - 0 ! |
[patch] * libtiff/tif_dirread.c: modify ChopUpSingleUncompressedStrip() to instanciate compute ntrips as TIFFhowmany_32(td->td_imagelength, rowsperstrip), instead of a logic based on the total size of data. Which is faulty is the total size of data is not sufficient to fill the whole image, and thus results in reading outside of the StripByCounts/StripOffsets arrays when using TIFFReadScanline(). Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2608. * libtiff/tif_strip.c: revert the change in TIFFNumberOfStrips() done for http://bugzilla.maptools.org/show_bug.cgi?id=2587 / CVE-2016-9273 since the above change is a better fix that makes it unnecessary. |
CVE 2016 10267.patch | (download) |
ChangeLog |
7 7 + 0 - 0 ! |
[patch] * libtiff/tif_ojpeg.c: make ojpegdecode() early exit in case of failure in OJPEGPreDecode(). This will avoid a divide by zero, and potential other issues. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2611 |
CVE 2017 7595.patch | (download) |
ChangeLog |
6 6 + 0 - 0 ! |
[patch] * libtiff/tif_jpeg.c: avoid integer division by zero in JPEGSetupEncode() when horizontal or vertical sampling is set to 0. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2653 |
CVE 2017 7598.patch | (download) |
ChangeLog |
8 8 + 0 - 0 ! |
[patch] * libtiff/tif_dirread.c: avoid division by floating point 0 in TIFFReadDirEntryCheckedRational() and TIFFReadDirEntryCheckedSrational(), and return 0 in that case (instead of infinity as before presumably) Apparently some sanitizers do not like those divisions by zero. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2644 |
CVE 2017 7596_CVE 2017 7597_CVE 2017 7599_CVE 2017 7600.patch | (download) |
ChangeLog |
10 10 + 0 - 0 ! |
[patch] * libtiff/tif_dir.c, tif_dirread.c, tif_dirwrite.c: implement various clampings of double to other data types to avoid undefined behaviour if the output range isn't big enough to hold the input value. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2643 http://bugzilla.maptools.org/show_bug.cgi?id=2642 http://bugzilla.maptools.org/show_bug.cgi?id=2646 http://bugzilla.maptools.org/show_bug.cgi?id=2647 |
CVE 2017 7601.patch | (download) |
ChangeLog |
6 6 + 0 - 0 ! |
[patch] * libtiff/tif_jpeg.c: validate bitspersample in JPEGSetupEncode() to avoid undefined behaviour caused by invalid shift exponent. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2648 |
CVE 2017 7602.patch | (download) |
ChangeLog |
6 6 + 0 - 0 ! |
[patch] * libtiff/tif_read.c: avoid potential undefined behaviour on signed integer addition in TIFFReadRawStrip1() in isMapped() case. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2650 |
CVE 2017 7592.patch | (download) |
ChangeLog |
7 7 + 0 - 0 ! |
[patch] =?utf-8?q?*=20libtiff/tif=5fgetimage.c:=20add=20explicit?= =?UTF-8?q?=20uint32=20cast=20in=20putagreytile=20to=20avoid=20UndefinedBe?= =?UTF-8?q?haviorSanitizer=20warning.=20Patch=20by=20Nicol=C3=A1s=20Pe?= =?UTF-8?q?=C3=B1a.=20Fixes=20http://bugzilla.maptools.org/show=5Fbug.cgi?= =?UTF-8?q?=3Fid=3D2658?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit |
CVE 2017 7593.patch | (download) |
ChangeLog |
8 8 + 0 - 0 ! |
[patch] * libtiff/tiffiop.h, tif_unix.c, tif_win32.c, tif_vms.c: add _TIFFcalloc() * libtiff/tif_read.c: TIFFReadBufferSetup(): use _TIFFcalloc() to zero initialize tif_rawdata. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2651 |
CVE 2017 5225.patch | (download) |
ChangeLog |
7 7 + 0 - 0 ! |
[patch] * tools/tiffcp.c: error out cleanly in cpcontig2separatebyrow and cpSeparate2ContigByRow if BitsPerSample != 8 to avoid heap based overflow. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2656 and http://bugzilla.maptools.org/show_bug.cgi?id=2657 |
CVE 2017 7594_part1.patch | (download) |
ChangeLog |
7 7 + 0 - 0 ! |
[patch] =?utf-8?q?*=20libtiff/tif=5fojpeg.c:=20fix=20leak=20in=20?= =?UTF-8?q?OJPEGReadHeaderInfoSecTablesAcTable=20when=20read=20fails.=20Pa?= =?UTF-8?q?tch=20by=20Nicol=C3=A1s=20Pe=C3=B1a.=20Fixes=20http://bugzilla.?= =?UTF-8?q?maptools.org/show=5Fbug.cgi=3Fid=3D2659?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit |