Package: tiff / 4.2.0-1+deb11u5
Metadata
Package | Version | Patches format |
---|---|---|
tiff | 4.2.0-1+deb11u5 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
fix_TIFFReadRawStrip_man_page_typo.patch | (download) |
html/man/TIFFReadRawStrip.3tiff.html |
2 1 + 1 - 0 ! |
fix tiffreadrawstrip man page typo Change TIFFReadEncodedStrip to TIFFReadRawStrip as needed. |
CVE 2022 0561.patch | (download) |
libtiff/tif_dirread.c |
5 3 + 2 - 0 ! |
[patch] tifffetchstripthing(): avoid calling memcpy() with a null source pointer and size of zero (fixes #362) |
CVE 2022 0562.patch | (download) |
libtiff/tif_dirread.c |
3 2 + 1 - 0 ! |
[patch] tiffreaddirectory(): avoid calling memcpy() with a null source pointer and size of zero (fixes #362) |
CVE 2022 22844.patch | (download) |
tools/tiffset.c |
17 14 + 3 - 0 ! |
[patch] tiffset: fix global-buffer-overflow for ascii tags where count is required (fixes #355) |
CVE 2022 0865.patch | (download) |
libtiff/tif_jbig.c |
10 10 + 0 - 0 ! |
[patch] tif_jbig.c: fix crash when reading a file with multiple ifd in memory-mapped mode and when bit reversal is needed (fixes #385) |
CVE 2022 0908.patch | (download) |
libtiff/tif_dirread.c |
5 4 + 1 - 0 ! |
[patch] tifffetchnormaltag(): avoid calling memcpy() with a null source pointer and size of zero (fixes #383) |
CVE 2022 0907.patch | (download) |
tools/tiffcrop.c |
33 21 + 12 - 0 ! |
[patch] add checks for return value of limitmalloc (#392) |
CVE 2022 0909.patch | (download) |
libtiff/tif_dir.c |
4 2 + 2 - 0 ! |
[patch] fix the fpe in tiffcrop (#393) |
CVE 2022 0891.patch | (download) |
tools/tiffcrop.c |
92 36 + 56 - 0 ! |
[patch] tiffcrop: fix issue #380 and #382 heap buffer overflow in extractImageSection |
CVE 2022 0924.patch | (download) |
tools/tiffcp.c |
17 16 + 1 - 0 ! |
[patch] fix heap buffer overflow in tiffcp (#278) |
CVE 2022 1354.patch | (download) |
libtiff/tif_dirread.c |
162 83 + 79 - 0 ! |
[patch] tiffreaddirectory: fix ojpeg hack (fixes #319) to avoid having the size of the strip arrays inconsistent with the number of strips returned by TIFFNumberOfStrips(), which may cause out-ouf-bounds array read afterwards. One of the OJPEG hack that alters SamplesPerPixel may influence the number of strips. Hence compute tif_dir.td_nstrips only afterwards. |
CVE 2022 1355.patch | (download) |
tools/tiffcp.c |
25 20 + 5 - 0 ! |
[patch] tiffcp: avoid buffer overflow in "mode" string (fixes #400) |
CVE 2022 1622.patch | (download) |
libtiff/tif_lzw.c |
16 15 + 1 - 0 ! |
[patch] tif_lzw.c: fix potential out-of-bounds error when trying to read in the same tile/strip after an error has occured (fixes #410) |
CVE 2022 2056.patch | (download) |
libtiff/tif_aux.c |
9 9 + 0 - 0 ! |
[patch] fix the fpe in tiffcrop (#415, #427, and #428) |
CVE 2022 2867.patch | (download) |
tools/tiffcrop.c |
79 52 + 27 - 0 ! |
[patch] tiffcrop.c: fix issue #352 heap-buffer-overflow by correcting uint32 underflow. |
CVE 2022 3570.patch | (download) |
tools/tiffcrop.c |
205 115 + 90 - 0 ! |
[patch] tiffcrop subroutines require a larger buffer (fixes #271, #381, #386, #388, #389, #435) |
CVE 2022 3599.patch | (download) |
libtiff/tif_dir.c |
121 72 + 49 - 0 ! |
[patch] revised handling of tifftag_inknames and related TIFFTAG_NUMBEROFINKS value In order to solve the buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value, a revised handling of those tags within LibTiff is proposed: Behaviour for writing: `NumberOfInks` MUST fit to the number of inks in the `InkNames` string. `NumberOfInks` is automatically set when `InkNames` is set. |
CVE 2022 3597.patch | (download) |
tools/tiffcrop.c |
39 39 + 0 - 0 ! |
--- |
CVE 2022 3970.patch | (download) |
libtiff/tif_getimage.c |
8 4 + 4 - 0 ! |
[patch] tiffreadrgbatileext(): fix (unsigned) integer overflow on strips/tiles > 2 GB Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53137 |
CVE 2022 34526.patch | (download) |
libtiff/tif_dirinfo.c |
3 3 + 0 - 0 ! |
[patch] _tiffcheckfieldisvalidforcodec(): return false when passed a codec-specific tag and the codec is not configured (fixes #433) This avoids crashes when querying such tags |
CVE 2022 48281.patch | (download) |
tools/tiffcrop.c |
2 1 + 1 - 0 ! |
[patch] tiffcrop: correct simple copy paste error. fix #488. |
CVE 2023 0795.patch | (download) |
tools/tiffcrop.c |
51 30 + 21 - 0 ! |
cve-2023-0795 This is also the fix for CVE-2023-0796, CVE-2023-0797, CVE-2023-0798, CVE-2023-0799. Bug-Debian: https://bugs.debian.org/1031632 |
CVE 2023 0800.patch | (download) |
tools/tiffcrop.c |
73 69 + 4 - 0 ! |
cve-2023-0800 This is also the fix for CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804. Bug-Debian: https://bugs.debian.org/1031632 |
CVE 2023 3576.patch | (download) |
tools/tiffcrop.c |
7 6 + 1 - 0 ! |
[patch] fix memory leak in tiffcrop.c |
CVE 2023 40745.patch | (download) |
tools/tiffcp.c |
7 7 + 0 - 0 ! |
[patch] tiffcp: fix memory corruption (overflow) on hostile images (fixes #591) |
CVE 2023 41175.patch | (download) |
tools/raw2tiff.c |
28 28 + 0 - 0 ! |
[patch] raw2tiff: fix integer overflow and bypass of the check (fixes #592) |