Commit graph

135 commits

Author SHA1 Message Date
he
7db92edbc9 Fix CVE-2016-10267 ref.
http://bugzilla.maptools.org/show_bug.cgi?id=2611
43bc256d8a
Bump PKGREVISION.
2017-05-07 21:52:16 +00:00
he
aab68e95d6 Fix CVE-2016-10266 ref.
http://bugzilla.maptools.org/show_bug.cgi?id=2596
438274f938
Bump PKGREVISION.
2017-05-07 21:32:30 +00:00
he
34e134e2a5 Fix CVE-2016-10268, ref.
http://bugzilla.maptools.org/show_bug.cgi?id=2598
5397a417e6
Bump PKGREVISION.
2017-05-06 21:37:16 +00:00
he
f4b1a1ef47 Fix CVE-2016-10270, ref.
http://bugzilla.maptools.org/show_bug.cgi?id=2608
9a72a69e03
Bump PKGREVISION.
2017-05-06 21:29:16 +00:00
he
350bf9bfaa Fix CVE-2016-10269, ref. http://bugzilla.maptools.org/show_bug.cgi?id=2604
and
1044b43637
Bump PKGREVISION.
2017-05-06 21:02:00 +00:00
he
718a5c631d Fix CVE-2016-10094, ref. http://bugzilla.maptools.org/show_bug.cgi?id=2640
and https://github.com/vadz/libtiff/commit/c7153361a4041260719b340f73f2f76
Bump PKGREVISION.
2017-05-06 20:34:40 +00:00
sevan
0cacb7511d CVE-2017-7596
CVE-2017-7597
CVE-2017-7599
CVE-2017-7600
3144e57770
Dependency for applying advisory patch.
+http://bugzilla.maptools.org/show_bug.cgi?id=2535
+0abd094b6e
Bump rev.
2017-05-05 20:14:05 +00:00
he
aa37e5dea0 Apply fix for CVE-2016-10093
http://bugzilla.maptools.org/show_bug.cgi?id=2610
787c0ee906
Bump PKGREVISION.
2017-05-05 20:06:02 +00:00
he
fe9a12a30c Apply fix from upstream to fix CVE-2016-10092, ref.
http://bugzilla.maptools.org/show_bug.cgi?id=2620 and
9657bbe3cd
Bump PKGREVISION.
2017-05-05 19:16:57 +00:00
sevan
d4bd6ca421 Add security patches & bump rev.
via FreeBSD bz #216658

https://nvd.nist.gov/vuln/detail/CVE-2017-5225
http://bugzilla.maptools.org/show_bug.cgi?id=2656
http://bugzilla.maptools.org/show_bug.cgi?id=2657
5c080298d5

https://nvd.nist.gov/vuln/detail/CVE-2017-7592
http://bugzilla.maptools.org/show_bug.cgi?id=2658
https://github.com/vadz/libtiff/commit/48780b4fcc42

https://nvd.nist.gov/vuln/detail/CVE-2017-7593
http://bugzilla.maptools.org/show_bug.cgi?id=2651
https://github.com/vadz/libtiff/commit/d60332057b95

https://nvd.nist.gov/vuln/detail/CVE-2017-7594
http://bugzilla.maptools.org/show_bug.cgi?id=2659
https://github.com/vadz/libtiff/commit/8283e4d1b7e5
https://github.com/vadz/libtiff/commit/2ea32f7372b6

https://nvd.nist.gov/vuln/detail/CVE-2017-7595
47f2fb61a3

https://nvd.nist.gov/vuln/detail/CVE-2017-7598
3cfd62d77c

https://nvd.nist.gov/vuln/detail/CVE-2017-7601
0a76a8c765

https://nvd.nist.gov/vuln/detail/CVE-2017-7602
66e7bd5952
2017-05-03 23:00:59 +00:00
he
2420a389c6 Add a couple patches to omit installing the documentation for
rgb2ycbcr and thumbnail, since these binaries are no longer being
installed.

Bump PKGREVISION.
2016-11-23 13:51:29 +00:00
wiz
e472a9616a Updated tiff to 4.0.7.
MAJOR CHANGES:

  • The libtiff tools bmp2tiff, gif2tiff, ras2tiff, sgi2tiff, sgisv, and ycbcr
    are completely removed from the distribution. These tools were written in
    the late 1980s and early 1990s for test and demonstration purposes. In some
    cases the tools were never updated to support updates to the file format,
    or the file formats are now rarely used. In all cases these tools increased
    the libtiff security and maintenance exposure beyond the value offered by
    the tool.

CHANGES IN LIBTIFF:

  • libtiff/tif_dirread.c: in TIFFFetchNormalTag(), do not dereference NULL
    pointer when values of tags with TIFF_SETGET_C16_ASCII /
    TIFF_SETGET_C32_ASCII access are 0-byte arrays. Fixes http://
    bugzilla.maptools.org/show_bug.cgi?id=2593 (regression introduced by
    previous fix done on 2016-11-11 for CVE-2016-9297). Reported by Henri Salo.
    Assigned as CVE-2016-9448
  • libtiff/tif_aux.c: fix crash in TIFFVGetFieldDefaulted() when requesting
    Predictor tag and that the zip/lzw codec is not configured. Fixes http://
    bugzilla.maptools.org/show_bug.cgi?id=2591
  • libtiff/tif_dirread.c: in TIFFFetchNormalTag(), make sure that values of
    tags with TIFF_SETGET_C16_ASCII / TIFF_SETGET_C32_ASCII access are null
    terminated, to avoid potential read outside buffer in _TIFFPrintField().
    Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2590
  • libtiff/tif_dirread.c: reject images with OJPEG compression that have no
    TileOffsets/StripOffsets tag, when OJPEG compression is disabled. Prevent
    null pointer dereference in TIFFReadRawStrip1() and other functions that
    expect td_stripbytecount to be non NULL. Fixes http://bugzilla.maptools.org
    /show_bug.cgi?id=2585
  • libtiff/tif_strip.c: make TIFFNumberOfStrips() return the td->td_nstrips
    value when it is non-zero, instead of recomputing it. This is needed in
    TIFF_STRIPCHOP mode where td_nstrips is modified. Fixes a read outsize of
    array in tiffsplit (or other utilities using TIFFNumberOfStrips()). Fixes
    http://bugzilla.maptools.org/show_bug.cgi?id=2587 (CVE-2016-9273)
  • libtiff/tif_predict.h, libtiff/tif_predict.c: Replace assertions by runtime
    checks to avoid assertions in debug mode, or buffer overflows in release
    mode. Can happen when dealing with unusual tile size like YCbCr with
    subsampling. Reported as MSVR 35105 by Axel Souchet & Vishal Chauhan from
    the MSRC Vulnerabilities & Mitigations
  • libtiff/tif_dir.c: discard values of SMinSampleValue and SMaxSampleValue
    when they have been read and the value of SamplesPerPixel is changed
    afterwards (like when reading a OJPEG compressed image with a missing
    SamplesPerPixel tag, and whose photometric is RGB or YCbCr, forcing
    SamplesPerPixel being 3). Otherwise when rewriting the directory (for
    example with tiffset, we will expect 3 values whereas the array had been
    allocated with just one), thus causing a out of bound read access. Fixes
    http://bugzilla.maptools.org/show_bug.cgi?id=2500 (CVE-2014-8127,
    duplicate: CVE-2016-3658)
  • libtiff/tif_dirwrite.c: avoid null pointer dereference on td_stripoffset
    when writing directory, if FIELD_STRIPOFFSETS was artificially set for a
    hack case in OJPEG case. Fixes http://bugzilla.maptools.org/show_bug.cgi?id
    =2500 (CVE-2014-8127, duplicate: CVE-2016-3658)
  • libtiff/tif_getimage.c (TIFFRGBAImageOK): Reject attempts to read floating
    point images.
  • libtiff/tif_predict.c (PredictorSetup): Enforce bits-per-sample
    requirements of floating point predictor (3). Fixes CVE-2016-3622 "Divide
    By Zero in the tiff2rgba tool."
  • libtiff/tif_pixarlog.c: fix out-of-bounds write vulnerabilities in heap
    allocated buffers. Reported as MSVR 35094. Discovered by Axel Souchet and
    Vishal Chauhan from the MSRC Vulnerabilities & Mitigations team.
  • libtiff/tif_write.c: fix issue in error code path of TIFFFlushData1() that
    didn't reset the tif_rawcc and tif_rawcp members. I'm not completely sure
    if that could happen in practice outside of the odd behaviour of
    t2p_seekproc() of tiff2pdf). The report points that a better fix could be
    to check the return value of TIFFFlushData1() in places where it isn't done
    currently, but it seems this patch is enough. Reported as MSVR 35095.
    Discovered by Axel Souchet & Vishal Chauhan & Suha Can from the MSRC
    Vulnerabilities & Mitigations team.
  • libtiff/tif_pixarlog.c: Fix write buffer overflow in PixarLogEncode if more
    input samples are provided than expected by PixarLogSetupEncode. Idea based
    on libtiff-CVE-2016-3990.patch from libtiff-4.0.3-25.el7_2.src.rpm by
    Nikola Forro, but with different and simpler check. (bugzilla #2544)
  • libtiff/tif_read.c: Fix out-of-bounds read on memory-mapped files in
    TIFFReadRawStrip1() and TIFFReadRawTile1() when stripoffset is beyond
    tmsize_t max value (reported by Mathias Svensson)
  • libtiff/tif_read.c: make TIFFReadEncodedStrip() and TIFFReadEncodedTile()
    directly use user provided buffer when no compression (and other
    conditions) to save a memcpy()
  • libtiff/tif_write.c: make TIFFWriteEncodedStrip() and TIFFWriteEncodedTile
    () directly use user provided buffer when no compression to save a memcpy
    ().
  • libtiff/tif_luv.c: validate that for COMPRESSION_SGILOG and
    PHOTOMETRIC_LOGL, there is only one sample per pixel. Avoid potential
    invalid memory write on corrupted/unexpected images when using the
    TIFFRGBAImageBegin() interface (reported by Clay Wood)
  • libtiff/tif_pixarlog.c: fix potential buffer write overrun in
    PixarLogDecode() on corrupted/unexpected images (reported by Mathias
    Svensson) (CVE-2016-5875)
  • libtiff/libtiff.def: Added _TIFFMultiply32 and _TIFFMultiply64 to
    libtiff.def
  • libtiff/tif_config.vc.h (HAVE_SNPRINTF): Add a '1' to the HAVE_SNPRINTF
    definition.
  • libtiff/tif_config.vc.h (HAVE_SNPRINTF): Applied patch by Edward Lam to
    define HAVE_SNPRINTF for Visual Studio 2015.
  • libtiff/tif_dirread.c: when compiled with DEFER_STRILE_LOAD, fix
    regression, introduced on 2014-12-23, when reading a one-strip file without
    a StripByteCounts tag. GDAL #6490
  • libtiff/*: upstream typo fixes (mostly contributed by Kurt Schwehr) coming
    from GDAL internal libtiff
  • libtiff/tif_fax3.h: make Param member of TIFFFaxTabEnt structure a uint16
    to reduce size of the binary.
  • libtiff/tif_read.c, tif_dirread.c: fix indentation issues raised by GCC 6
    -Wmisleading-indentation
  • libtiff/tif_pixarlog.c: avoid zlib error messages to pass a NULL string to
    %s formatter, which is undefined behaviour in sprintf().
  • libtiff/tif_next.c: fix potential out-of-bound write in NeXTDecode()
    triggered by http://lcamtuf.coredump.cx/afl/vulns/libtiff5.tif (bugzilla #
    2508)
  • libtiff/tif_luv.c: fix potential out-of-bound writes in decode functions in
    non debug builds by replacing assert()s by regular if checks (bugzilla #
    2522). Fix potential out-of-bound reads in case of short input data.
  • libtiff/tif_getimage.c: fix out-of-bound reads in TIFFRGBAImage interface
    in case of unsupported values of SamplesPerPixel/ExtraSamples for LogLUV /
    CIELab. Add explicit call to TIFFRGBAImageOK() in TIFFRGBAImageBegin(). Fix
    CVE-2015-8665 reported by limingxing and CVE-2015-8683 reported by zzf of
    Alibaba.
  • libtiff/tif_dirread.c: workaround false positive warning of Clang Static
    Analyzer about null pointer dereference in TIFFCheckDirOffset().
  • libtiff/tif_fax3.c: remove dead assignment in Fax3PutEOLgdal(). Found by
    Clang Static Analyzer
  • libtiff/tif_dirwrite.c: fix truncation to 32 bit of file offsets in
    TIFFLinkDirectory() and TIFFWriteDirectorySec() when aligning directory
    offsets on a even offset (affects BigTIFF). This was a regression of the
    changeset of 2015-10-19.
  • libtiff/tif_write.c: TIFFWriteEncodedStrip() and TIFFWriteEncodedTile()
    should return -1 in case of failure of tif_encodestrip() as documented
  • libtiff/tif_dumpmode.c: DumpModeEncode() should return 0 in case of failure
    so that the above mentionned functions detect the error.
  • libtiff/*.c: fix MSVC warnings related to cast shortening and assignment
    within conditional expression
  • libtiff/*.c: fix clang -Wshorten-64-to-32 warnings
  • libtiff/tif_dirread.c: prevent reading ColorMap or TransferFunction if
    BitsPerPixel > 24, so as to avoid huge memory allocation and file read
    attempts
  • libtiff/tif_dirread.c: remove duplicated assignment (reported by Clang
    static analyzer)
  • libtiff/tif_dir.c, libtiff/tif_dirinfo.c, libtiff/tif_compress.c, libtiff/
    tif_jpeg_12.c: suppress warnings about 'no previous declaration/prototype'
  • libtiff/tiffiop.h, libtiff/tif_dirwrite.c: suffix constants by U to fix
    'warning: negative integer implicitly converted to unsigned type' warning
    (part of -Wconversion)
  • libtiff/tif_dir.c, libtiff/tif_dirread.c, libtiff/tif_getimage.c, libtiff/
    tif_print.c: fix -Wshadow warnings (only in libtiff/)

CHANGES IN THE TOOLS:

  • tools/Makefile.am: The libtiff tools bmp2tiff, gif2tiff, ras2tiff,
    sgi2tiff, sgisv, and ycbcr are completely removed from the distribution.
    The libtiff tools rgb2ycbcr and thumbnail are only built in the build tree
    for testing. Old files are put in new 'archive' subdirectory of the source
    repository, but not in distribution archives. These changes are made in
    order to lessen the maintenance burden.
  • tools/tiff2pdf.c: avoid undefined behaviour related to overlapping of
    source and destination buffer in memcpy() call in t2p_sample_rgbaa_to_rgb()
    Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2577
  • tools/tiff2pdf.c: fix potential integer overflows on 32 bit builds in
    t2p_read_tiff_size() Fixes http://bugzilla.maptools.org/show_bug.cgi?id=
    2576
  • tools/fax2tiff.c: fix segfault when specifying -r without argument. Patch
    by Yuriy M. Kaminskiy. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=
    2572
  • tools/tiffinfo.c: fix out-of-bound read on some tiled images. (http://
    bugzilla.maptools.org/show_bug.cgi?id=2517)
  • tools/tiffcrop.c: fix multiple uint32 overflows in
    writeBufferToSeparateStrips(), writeBufferToContigTiles() and
    writeBufferToSeparateTiles() that could cause heap buffer overflows.
    Reported by Henri Salo from Nixu Corporation. Fixes http://
    bugzilla.maptools.org/show_bug.cgi?id=2592
  • tools/tiffcrop.c: fix out-of-bound read of up to 3 bytes in
    readContigTilesIntoBuffer(). Reported as MSVR 35092 by Axel Souchet &
    Vishal Chauhan from the MSRC Vulnerabilities & Mitigations team.
  • tools/tiff2pdf.c: fix write buffer overflow of 2 bytes on JPEG compressed
    images. Reported by Tyler Bohan of Cisco Talos as TALOS-CAN-0187 /
    CVE-2016-5652. Also prevents writing 2 extra uninitialized bytes to the
    file stream.
  • tools/tiffcp.c: fix out-of-bounds write on tiled images with odd tile width
    vs image width. Reported as MSVR 35103 by Axel Souchet and Vishal Chauhan
    from the MSRC Vulnerabilities & Mitigations team.
  • tools/tiff2pdf.c: fix read -largely- outsize of buffer in
    t2p_readwrite_pdf_image_tile(), causing crash, when reading a JPEG
    compressed image with TIFFTAG_JPEGTABLES length being one. Reported as MSVR
    35101 by Axel Souchet and Vishal Chauhan from the MSRC Vulnerabilities &
    Mitigations team.
  • tools/tiffcp.c: fix read of undefined variable in case of missing required
    tags. Found on test case of MSVR 35100.
  • tools/tiffcrop.c: fix read of undefined buffer in
    readContigStripsIntoBuffer() due to uint16 overflow. Probably not a
    security issue but I can be wrong. Reported as MSVR 35100 by Axel Souchet
    from the MSRC Vulnerabilities & Mitigations team.
  • tools/tiffcrop.c: fix various out-of-bounds write vulnerabilities in heap
    or stack allocated buffers. Reported as MSVR 35093, MSVR 35096 and MSVR
    35097. Discovered by Axel Souchet and Vishal Chauhan from the MSRC
    Vulnerabilities & Mitigations team.
  • tools/tiff2pdf.c: fix out-of-bounds write vulnerabilities in heap allocate
    buffer in t2p_process_jpeg_strip(). Reported as MSVR 35098. Discovered by
    Axel Souchet and Vishal Chauhan from the MSRC Vulnerabilities & Mitigations
    team.
  • tools/tiff2bw.c: fix weight computation that could result of color value
    overflow (no security implication). Fix bugzilla #2550. Patch by Frank
    Freudenberg.
  • tools/rgb2ycbcr.c: validate values of -v and -h parameters to avoid
    potential divide by zero. Fixes CVE-2016-3623 (bugzilla #2569)
  • tools/tiffcrop.c: Fix out-of-bounds write in loadImage(). From patch
    libtiff-CVE-2016-3991.patch from libtiff-4.0.3-25.el7_2.src.rpm by Nikola
    Forro (bugzilla #2543)
  • tools/tiff2rgba.c: Fix integer overflow in size of allocated buffer, when
    -b mode is enabled, that could result in out-of-bounds write. Based
    initially on patch tiff-CVE-2016-3945.patch from
    libtiff-4.0.3-25.el7_2.src.rpm by Nikola Forro, with correction for invalid
    tests that rejected valid files. (bugzilla #2545)
  • tools/tiffcrop.c: Avoid access outside of stack allocated array on a tiled
    separate TIFF with more than 8 samples per pixel. Reported by Kaixiang
    Zhang of the Cloud Security Team, Qihoo 360 (CVE-2016-5321 / CVE-2016-5323
    , bugzilla #2558 / #2559)
  • tools/tiffdump.c: fix a few misaligned 64-bit reads warned by -fsanitize
  • tools/tiffdump.c (ReadDirectory): Remove uint32 cast to _TIFFmalloc()
    argument which resulted in Coverity report. Added more mutiplication
    overflow checks.
2016-11-22 15:19:54 +00:00
adam
e6c861c860 Updated MASTER_SITES and HOMEPAGE; the old ones seem to be dead. 2016-10-08 06:20:39 +00:00
tez
67f3cbb9fa Fix for CVE-2015-8781, CVE-2015-8782, CVE-2015-8783 from:
aaab5c3c9d.diff
2016-03-22 21:50:13 +00:00
wiz
ea360da267 Update to 4.0.6:
MAJOR CHANGES:

    Now builds with CMake 2.8.9 and newer (previously required
    3.0.0)

CHANGES IN THE SOFTWARE CONFIGURATION:

    CMakeLists.txt / CMake
	Supports CMake 2.8.9 and later.
	Add missing file which wasn't being distributed, causing
	unit tests to fail.
	Make shared/static library building configurable.
	CMake reads all version information directly from configure.ac
	to avoid duplication of values.
	CMake builds are now included in 'distcheck' target.
    Makefile.am
	Autotools 'make distcheck' now tests the CMake-based build
	if CMake is available.

CHANGES IN LIBTIFF:

    Fixes to avoid undefined behaviour of signed types (C standard
    compliance).
    Fixes to avoid possible isses when casting to unsigned char.
    Fixes to avoid undefined behaviour with shifts.
    Fix generation of output with 16 bit or 32 bit integer, when
    byte swapping is needed, in horizontal predictor (#2521).
    Fix decoding when there is a single pixel to decode (unlikely
    case...) and byte swapping is involved.
    Add add explicit masking with 0xff before casting to uchar in
    floating-point horizontal differencing and accumulation routines.
    Eliminate requirement for and use of 64-bit constant values.

CHANGES IN THE TOOLS:

    tiffgt
	Silence glut API deprecation warnings on MacOS X.
    fax2ps
	Detect failure to write to temporary file.
2015-09-13 09:27:08 +00:00
adam
8db51bf51b Changes 4.0.5:
* Support for configure/build using CMake.
* Support for large (> 2GB) files under Microsoft Windows.
2015-09-05 10:47:57 +00:00
ryoon
fea514a339 Update to 4.0.4
Changelog:
2015-06-21  Bob Friesenhahn  <bfriesen@simple.dallas.tx.us>

	* libtiff 4.0.4 released.

	* configure.ac: Add a HAVE_FOO Automake conditional for each
	add-on library.

	* test/Makefile.am (JPEG_DEPENDENT_CHECK_PROG): raw_decode
	requires JPEG support to compile.  Use Automake conditional to
	only include it when JPEG support is available.

	* html/build.html: Try to improve the nmake-based VC++ build
	description.

	* libtiff/tiffconf.vc.h: Build fixes based on testing.

	* libtiff/tif_config.vc.h: Build fixes based on testing.

	* libtiff/libtiff.def: TIFFRasterScanline does not exist so remove
	export for it.

2015-06-20  Bob Friesenhahn  <bfriesen@simple.dallas.tx.us>

	* libtiff/tif_config.vc.h: Make adjustments to match the new
	definitions that configure produces, including for WIN64.  Still
	needs to be tested.

	* configure.ac: For 64-bit MinGW, fix SSIZE_FORMAT formatting
	specifier.  64-bit MinGW supports 'long long' but support for
	'lld' is not assured by the run-time DLLs and so GCC warns.
	Add TIFF_SIZE_T and TIFF_SIZE_FORMAT to provide a type definition
	and printf format specifier to deal with printing values of
	'size_t' type.  In particular, this was necessary for WIN64.
	Added a configure test for if the system headers provide 'optarg'
	(normal case) and block out the many explicit 'extern' statements
	in the utilities.  This was found to be necessary under Windows
	when getopt is in a DLL and the symbols are already imported with
	dllimport via standard header files.

	* test/raw_decode.c (XMD_H): Avoid conflicting typedefs for INT32
	and boolean in MinGW build due to including jpeglib.h.

	* test/rewrite_tag.c (main): Fix problem with location of variable
	declaration.

	* libtiff/libtiff.def: Added exports for TIFFGetConfiguredCODECs,
	TIFFReadRGBAImageOriented, TIFFSetCompressionScheme,
	TIFFSwabArrayOfTriples, TIFFVGetFieldDefaulted, _TIFFCheckRealloc,
	TIFFRasterScanline, TIFFSetErrorHandlerExt,
	TIFFSetWarningHandlerExt, TIFFNumberOfDirectories,
	TIFFCreateCustomDirectory, TIFFCreateEXIFDirectory,
	TIFFWriteCustomDirectory, _TIFFRewriteField as recommended by
	Roger Leigh and justified by use in libtiff tests, documentation,
	and changelog notes.  Also sorted symbol list and removed
	duplicate entries.

2015-06-16  Bob Friesenhahn  <bfriesen@simple.dallas.tx.us>

	* libtiff/tif_getimage.c: Fix four Coverity issues related to
	unintended sign extension.

2015-06-16  Even Rouault <even.rouault at spatialys.com>

	* libtiff/tif_unix.c: fix compilation with MSVC (fix by Jeff McKenna)

2015-06-14  Lee Howard  <faxguy@howardsilvan.com>

	* libtiff/tif_unix.c: contribution from Vadim Zeitlin on
	Bugzilla Bug #2510 fixes several harmless but still annoying
	warnings

	* configure: contribution from Ludolf Holzheid on Bugzilla
	Bug #2498.  Adds an option to select the file I/O style on
	Windows hosts.

	* libtiff/tif_getimage.c: contribution from Gary Cramblitt
	on Bugzilla Bug #2409.  Correct reading of certain tiled TIFFs.

	* configure, configure.ac: contribution from Marcos H. Woehrmann
	on Bugzilla Bug #2405.  Correct shell equality operator.

	* tools/tiffgt.c (raster_draw): contribution from Jay Berkenbilt
	on Bugzilla Bug #2401.  Appropriately call glFlush().

	* tools/tiff2pdf.c: change ColorTransform from "0" to "1"
	following Bugzilla Bug #2150.

2015-06-13  Lee Howard  <faxguy@howardsilvan.com>

	* libtiff/tif_lzw.c: contribution from Andy Cave - decode
	files that contain consecutive CODE_CLEAR codes.

	* tools/tiff2pdf.c: contribution from Antti S. Lankila on
	Bugzilla Bug #2078. Suppress initial output of the header.

	* tools/tiff2pdf.c: contribution from Yuriy M. Kaminskiy -
	Take care in using the return value from snprintf().

	* tools/tiffcrop.c: contribution from Eduardo Robles Elvira -
	correctly copy the compression tag from the source TIFF.

	* tools/tiff2ps.c: contribution from Eduardo Robles Elvira -
	correct sizing and scaling problems with output document.

2015-06-10  Bob Friesenhahn  <bfriesen@simple.dallas.tx.us>

	* libtiff/tif_jpeg.c (JPEGDecode): Split JPEGDecode() into two
	clean implementations in order to avoid pre-processor hell.  Only
	one of the implementations is used in a given build.

2015-06-08  Even Rouault <even.rouault at spatialys.com>

	* libtiff/tif_jpeg.c: Fix compilation in BITS_IN_JSAMPLE == 12
	case

2015-06-07  Bob Friesenhahn  <bfriesen@simple.dallas.tx.us>

	* libtiff/tif_write.c (TIFFWriteEncodedStrip): Fix Coverity 715975
	"Division or modulo by zero".
	(TIFFWriteEncodedTile): Fix Coverity 715976 and 715977 "Division
	or modulo by zero".
	(TIFFWriteRawStrip): Fix Coverity 715978 "Division or modulo by
	zero".
	(TIFFWriteScanline): Fix Coverity 715979 "Division or modulo by
	zero".

	* libtiff/tif_read.c (TIFFStartTile): Fix Coverity 715973 and
	715974 "Division or modulo by zero".

2015-05-31  Bob Friesenhahn  <bfriesen@simple.dallas.tx.us>

	* libtiff/tif_dir.c (TIFFNumberOfDirectories): Quiet Coverity
	1134470 "Logically dead code" by making the roll-over check
	explicit.

	* libtiff/tif_luv.c (LogLuvDecodeTile): Fix Coverity 991227
	"Division or modulo by zero".
	(LogLuvDecodeStrip): Fix Coverity 991239 "Division or modulo by
	zero".
	(LogLuvEncodeStrip): Fix Coverity 991240 "Division or modulo by
	zero".
	(LogLuvEncodeTile): Fix Coverity 991241 "Division or modulo by
	zero".

	* libtiff/tif_dirread.c (TIFFReadDirEntryDoubleArray): Fix
	Coverity 298626 "Logically dead code".
	(TIFFReadDirEntryFloatArray): Fix Coverity 298627 "Logically dead
	code".
	(TIFFReadDirEntryIfd8Array): Fix Coverity 298628 "Logically dead
	code".
	(TIFFReadDirEntrySlong8Array): Fix Coverity 298629 "Logically dead
	code"

	* libtiff/tif_dir.c (TIFFNumberOfDirectories): Don't depend on ++
	operator precedenc in evaluation.  Might quench Coverity 1134470
	"Logically dead code".

	* libtiff/tif_jpeg.c (JPEGDecode): Fix Coverity 602597 "Operands
	don't affect result".  This change uses ifdefs to include
	applicable code based on properties of libjpeg.  Still needs to be
	re-tested with 12-bit "6b" and "MK1".

2015-05-30  Bob Friesenhahn  <bfriesen@simple.dallas.tx.us>

	* libtiff/tif_dirwrite.c (_TIFFRewriteField): Fix Coverity 1024310
	"Resource leak".

	* libtiff/tif_ojpeg.c (OJPEGReadHeaderInfoSecStreamDht): Fix
	Coverity 601720 "Resource leak".

	* libtiff/tif_jpeg.c (JPEGCleanup): Fix Coverity 298624
	"Dereference before null check".

	* libtiff/tif_ojpeg.c (OJPEGReadBufferFill): Fix Coverity 603400
	"Missing break in switch".

	* contrib/addtiffo/tif_overview.c (TIFF_DownSample): Check buffer
	size calculation for overflow.

	* contrib/addtiffo/addtiffo.c (main): Possibly address Coverity
	1024226 "Untrusted value as argument".

	* tools/gif2tiff.c (readgifimage): Fix Coverity 1024222 "Untrusted
	value as argument".
	(checksignature): Fix Coverity 1024894 "Ignoring number of bytes
	read".
	(readextension): Fix Coverity 1024893 "Ignoring number of bytes
	read".
	(readgifimage): Fix Coverity 1024890 "Ignoring number of bytes
	read".
	(readraster): Fix Coverity 1024891 "Ignoring number of bytes
	read".
	(readgifimage): Fix Coverity 1024892 "Ignoring number of bytes
	read".

	* tools/tiff2pdf.c (t2p_readwrite_pdf_image): Fix Coverity 1024181
	"Structurally dead code".

	* tools/raw2tiff.c (main): Fix Coverity 1024887 "Unchecked return
	value from library".
	(guessSize): Fix Coverity 1024888 "Unchecked return value from
	library".
	(guessSize): Fix Coverity 1214162 "Ignoring number of bytes read".
	(guessSize): Fix Coverity 1024889 "Unchecked return value from
	library".

	* tools/tiff2pdf.c (t2p_readwrite_pdf_image): Fix Coverity 298621
	"Resource leak".
	(t2p_readwrite_pdf_image): Fix Coverity 1024181 "Structurally dead
	code".
	(t2p_write_pdf): Fix Coverity 1227690 "Unused value".

2015-05-29  Bob Friesenhahn  <bfriesen@simple.dallas.tx.us>

	* contrib/iptcutil/iptcutil.c (formatIPTC): Fix Coverity 1024468
	"Infinite loop".
	(formatIPTC): Fix Coverity 1024727 "Truncated stdio return value".
	(formatIPTC): Fix Coverity 1214240 "Untrusted loop bound".

2015-05-28  Bob Friesenhahn  <bfriesen@simple.dallas.tx.us>

	* contrib/addtiffo/tif_ovrcache.c (TIFFCreateOvrCache): Fix
	Coverity 298615 "Resource leak".
	(TIFFGetOvrBlock): Fix Coverity 1024649 "Unintended sign
	extension".

	* tools/bmp2tiff.c (main): Fix Coverity 1024225 "Untrusted value
	as argument".
	(main): Fix Coverity 1024678 "Unchecked return value from
	library".
	(main): Fix Coverity 1024679 "Unchecked return value from
	library".
	(main): Fix Coverity 1214160 "Ignoring number of bytes read".

	* contrib/addtiffo/tif_ovrcache.c (TIFFCreateOvrCache): Fix
	Coverity 298615 "Resource leak".

	* tools/tiffcp.c: Fix Coverity 1024306, 1024307, 1024308, 1024309
	"Resource leak".

	* tools/tiffsplit.c (cpTiles): Fix Coverity 1024304 "Resource
	leak".
	(cpStrips): Fix Coverity 1024305 "Resource leak".

2015-05-27  Bob Friesenhahn  <bfriesen@simple.dallas.tx.us>

	* tools/ras2tiff.c: Fix Sun Raster header definition to be safe
	for 64-bit systems.  Add some header validations.  Should fix many
	Coverity issues.
	(main): Fix Coverity 1301206: "Integer handling issues  (BAD_SHIFT)".
	(main): Quiet Coverity 1024223 "Untrusted value as argument".

	* tools/tiffmedian.c (GetInputLine): Fix Coverity 1024795 "Nesting
	level does not match indentation".
	(get_histogram): Quiet Coverity 1024386 "Out-of-bounds read".
	This was a benign mis-diagnosis but added code to enforce against
	buffer overflow.

	* tools/tiffcrop.c (ROTATE_ANY): Fix Coverity 1294542 "Logical
	vs. bitwise operator".
	(readContigStripsIntoBuffer): Fix Coverity 1024545 "Division or
	modulo by zero".
	(readContigTilesIntoBuffer): Fix Coverity 1024586 "Logically dead
	code".
	(writeSingleSection): Fix Coverity 1024796 "Nesting level does not
	match indentation".
	(writeCroppedImage): Fix Coverity 1024797 "Nesting level does not
	match indentation".
	(loadImage): Fix Coverity 1299741 "Dereference before null check".
	(loadImage): Fix Coverity 1299740 "Out-of-bounds write".

2015-03-02  Even Rouault  <even.rouault@spatialys.com>

	* tools/tiffdither.c: check memory allocations to avoid writing to
	NULL pointer. Also check multiplication overflow. Fixes #2501,
	CVE-2014-8128. Derived from patch by Petr Gajdos.
2015-06-30 10:42:19 +00:00
bsiegert
16923d96ee SECURITY: Update libtiff to 4.0.4beta to fix
CVE-2014-8127
CVE-2014-8128
CVE-2014-8129
CVE-2014-8130 (likely)

Remaining unfixed vulnerabilities: CVE-2014-9655, CVE-2015-1547 (but
these are unfixed upstream AFAICS).

ok wiz
2015-03-29 14:47:03 +00:00
wiz
cda18437be Remove pkgviews: don't set PKG_INSTALLATION_TYPES in Makefiles. 2014-10-09 14:05:50 +00:00
dholland
d733bebe37 Add upstream candidate patch for CVE-2013-4243. PKGREVISION -> 6 2013-09-21 18:47:05 +00:00
richard
ebff7b4ae5 update PKGREVISION/BUILDLINK_ABI_DEPENDS 2013-08-28 16:51:36 +00:00
richard
12a88b5008 complete jbigkit support in tiff/buildlink3.mk 2013-08-25 11:48:11 +00:00
drochner
1881f9b85a add patches from upstream CVS and Redhat bugzilla to fix buffer overflow
and use-after-free problems in the "gif2tiff" and "tiff2pdf"
command line tools (the library is not affected)
(CVE-2013-4231, CVE-2013-4232, CVE-2013-4244)
bump PKGREV
2013-08-15 14:58:46 +00:00
drochner
ca8563b90c add patches from Redhat to fix possible buffer overflows in the
"tiff2pdf" tool by crafted TIFF image files
(CVE-2013-1960/61)
bump PKGREV
2013-05-02 14:52:44 +00:00
rodent
e5b2fdbc78 'Please use ${ECHO} instead of "echo".'
'Please use ${ECHO_N} instead of "echo -n".'
2013-04-06 14:58:18 +00:00
adam
f4c3b89da7 Revbump after graphics/jpeg and textproc/icu 2013-01-26 21:36:13 +00:00
drochner
46764f6b24 add patch from Redhat bug #871700 to fix a possible buffer overflow
due to integer overflow in the ppm2tiff cmd line tool (CVE-2012-4564)
bump PKGREV
2012-11-05 12:41:48 +00:00
asau
08f35c7155 Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-06 14:10:39 +00:00
adam
14530f2edc Changes 4.0.3:
MAJOR CHANGES:
None
CHANGES IN THE SOFTWARE CONFIGURATION:
Updated to use Automake 1.12.4. Avoids security problem with 'make distcheck' (CVE-2012-3386).
CHANGES IN LIBTIFF:
Various memory buffer access fixes.
Fix handling when writing RGBA jpeg compressed imagery (http://trac.osgeo.org/gdal/ticket/4732).
Fix to work properly with IJG JPEG 7+.
New functions TIFFFieldTag(), TIFFFieldName(), TIFFFieldDataType(), TIFFFieldPassCount(), TIFFFieldReadCount(), TIFFFieldWriteCount() to use as external accessors for the opaque type TIFFField.
Fix bug rewriting image tiles in a compressed file (http://trac.osgeo.org/gdal/ticket/4771).
Add TIFF/FX tag support in libtiff.
CHANGES IN THE TOOLS:
tiff2pdf: Fail when TIFFSetDirectory() fails. This prevents core dumps or perhaps even arbitrary code execution when processing a corrupt input file (CVE-2012-3401).
tiff2pdf: Fix two places where t2p_error didn't get set after a malloc failure. No crash risk AFAICS, but the program might not report exit code 1 as desired.
CHANGES IN THE CONTRIB AREA:
None
2012-10-01 18:11:29 +00:00
wiz
0714bb7de0 Fix CVE-2012-3401, buffer overflow in tiff2pdf.
Bump PKGREVISION.
2012-07-19 21:41:45 +00:00
wiz
6060d4d090 Update to 4.0.2 for CVE-2012-2113.
* tif_getimage.c: added support for _SEPARATED CMYK images.
     * tif_getimage.c: Added support for greyscale + alpha.
     * Added TIFFCreateCustomDirectory() and TIFFCreateEXIFDirectory()
       functions.
     * tif_print.c: Lots of fixes around printing corrupt or hostile input.
     * Improve handling of corrupt ycbcrsubsampling values.
     * tif_unix.c: use strerror to get meaningful error messages.
     * tif_jpeg.c: fix serious bugs in JPEGDecodeRaw().
     * tif_jpeg.c: Fix size overflow (zdi-can-1221,CVE-2012-1173).
2012-06-20 21:07:14 +00:00
taca
d529c991c0 Add fix for CVE-2012-1173 from upstream.
Bump PKGREVISION.
2012-04-10 14:13:04 +00:00
drochner
bb694536f3 -pull in xz/bl3 to avoid hidden dependency
-update to 4.0.1 -- this only adds symbol versioning support to ease
 transition from 3.x to 4.x; this is not used in pkgsrc so the
 update is purely cosmetical
2012-02-21 13:03:00 +00:00
wiz
379f888f27 Update tiff to 4.0:
At long last, libtiff 4.0.0 is finally released.  Libtiff 4.0.0 is the
successor to the libtiff 3.9.X release series.  It is intended to be
largely API compatible with the 3.9.X releases, but it is definitely
not ABI compatible so any software which plans to use it will need to
be recompiled.  With appropriate care, source code can easily compile
with both the 3.9.X releases and libtiff 4.0.0.

This release supports the BigTIFF TIFF format in which all offsets are
unsigned 64-bit, supporting huge files.  APIs which deal with tag
offsets are necessarily updated to pass 64-bit values.  I/O functions
supporting the TIFFClientOpen() interface are updated to pass 64-bit
offset values.
2012-02-06 12:30:52 +00:00
wiz
cf1950d152 Update to 3.9.5:
Many bugs and security issues are resolved in this stable release.
2011-04-12 08:57:57 +00:00
drochner
95bcc3e8fe add patch from upstream
(http://bugzilla.maptools.org/show_bug.cgi?id=2300)
to fix possible buffer overflow in the "thunder" decoder (CVE-2011-1167)
bump PKGREV
2011-03-31 11:05:44 +00:00
tron
5733c6c7a9 Add fix for vulnerability reported in SA43593 taken from the
"libtiff" CVS repository.
2011-03-12 16:10:42 +00:00
dsainty
1f40f3a084 Mechanically replace references to graphics/jpeg with the suitable
alternative from mk/jpeg.buildlink3.mk

This allows selection of an alternative jpeg library (namely the x86 MMX,
SSE, SSE2 accelerated libjpeg-turbo) via JPEG_DEFAULT=libjpeg-turbo, and
follows the current standard model for alternatives (fam, motif, fuse etc).

The mechanical edits were applied via the following script:

#!/bin/sh
for d in */*; do
  [ -d "$d" ] || continue
  for i in "$d/"Makefile* "$d/"*.mk; do
    case "$i" in *.orig|*"*"*) continue;; esac
    out="$d/x"
    sed -e 's;graphics/jpeg/buildlink3\.mk;mk/jpeg.buildlink3.mk;g' \
        -e 's;BUILDLINK_PREFIX\.jpeg;JPEGBASE;g' \
        < "$i" > "$out"
    if cmp -s "$i" "$out"; then
      rm -f "$out"
    else
      echo "Edited $i"
      mv -f "$i" "$i.orig" && mv "$out" "$i"
    fi
  done
done
2010-12-23 11:44:24 +00:00
tron
030186375d Add patches from either libtiff's or Red Hat's Bugzilla which fix the
following vulnerabilities:
- CVE-2010-2233
- CVE-2010-2482
- CVE-2010-2483
- CVE-2010-2595
- CVE-2010-2597
There is no patch for CVE-2010-2596 yet. But it is low risk (an assertion
gets triggered) and cannot be exploited after the above vulnerabilities
are fixed (at least if I understood correctly).

No butcher was involved in fixing this package.
2010-08-04 17:48:22 +00:00
drochner
8961a28632 update to 3.9.4
changes:
-Complete the fixes for CVE-2009-2347.
-Tiffcrop now supports custom page sizes.
+minor bugfixes
2010-06-16 13:56:41 +00:00
dholland
04c1877a53 Update to 3.9.3, fixing CVE-2010-1411. Other changes are minor bug fixes;
gory details at http://www.remotesensing.org/libtiff/v3.9.3.html.
2010-06-15 05:57:45 +00:00
tnn
8e202bfc1b tiff seems to be a common point of failure from the jpeg fallout,
so bump the revision.
2010-01-29 11:14:57 +00:00
wiz
91871f449e Second try at jpeg-8 recursive PKGREVISION bump. 2010-01-18 09:58:37 +00:00
drochner
850d444779 updated to 3.9.2
changes:
-bugfixes
-OJPEG support updated to work with IJG JPEG 7 release
-Tiffcrop validated for most TIFF storage subformats and sample depths
2009-11-15 18:12:44 +00:00
wiz
f01d749a2b Update to 3.9.1:
This is a bugfix release to correct serious defects found in libtiff
3.9.0. In particular, it was discovered that libtiff 3.9.0 may
write defective TIFF files. This release is intended to be API and
ABI compatible with libtiff 3.8.2.
2009-08-29 12:32:08 +00:00
sno
6f7368d4db bump revision because of graphics/jpeg update 2009-08-26 19:56:37 +00:00
wiz
a5394b0b0e Update to 3.9.0:
MAJOR CHANGES:
  * New tiffcrop utility contributed by Richard Nolde. tiffcrop does the
    same as tiffcp, but also can crop, extract, rotate and mirror images.
  * tif_jbig.c: Added support for JBIG compression scheme (34661 code),
    contributed by Lee Howard.
  * Totally new implementation of OJPEG module from Joris Van Damme. No
    need to patch libjpeg anymore. Many OJPEG files should be supported
    now that was not supported previously.

------------------------------------------------

CHANGES IN THE SOFTWARE CONFIGURATION:
  * tif_config.wince.h, tiffconf.wince.h, tif_wince.c: WinCE-specific
    compatibility stuff from Mateusz Loskot.
  * Rename config.h.vc and tif_config.h.vc to config.vc.h and
    tif_config.vc.h for easier identification by folks using an IDE.
  * configure, configure.ac: OJPEG support enabled by default (i.e., whe
    the conformant JPEG support enabled).
  * README.vms, Makefile.am, configure.com, libtiff/{Makefile.am,
    tif_config.h-vms, tif_stream.cxx, tif_vms.c, tiffconf.h-vms}: Added
    support for OpenVMS by Alexey Chupahin.
  * nmake.opt: use /EHsc for VS2005 compatibility. Also define
    _CRT_SECURE_NO_DEPRECATE to avoid noise on VS2005.

------------------------------------------------

CHANGES IN LIBTIFF:
  * tif_dirinfo.c (_TIFFFindFieldInfo): Don't attempt to bsearch() on a
    NULL fieldinfo list. (_TIFFFindFieldInfoByName): Don't attempt to
    lfind() on a NULL fieldinfo list.
  * tif_jpeg.c: Changed JPEGInitializeLibJPEG() so that it will convert
    from decompressor to compressor or compress to decompress if required
    by the force arguments. This works around a problem in where the
    JPEGFixupTestSubsampling() may cause a decompressor to be setup on a
    directory when later a compressor is required with the force flag set.
    Occurs with the addtiffo program for instance.
  * tif_dirwrite.c: Fixed swapping of byte arrays stored in-place in tag
    offsets as per bug
    http://bugzilla.remotesensing.org/show_bug.cgi?id=1363
  * tif_getimage.c: workaround for 'Fractional scanline' error reading
    OJPEG images with rowsperstrip that is not a multiple of vertical
    subsampling factor. This bug is mentioned in
    http://bugzilla.remotesensing.org/show_bug.cgi?id=1390 and
    http://www.asmail.be/msg0054766825.html
  * tif_dirread.c: Added special function to handle SubjectDistance EXIF
    tag as per bug http://bugzilla.remotesensing.org/show_bug.cgi?id=1362
  * tif_dirread.c, tif_read.c: Type of the byte counters changed from
    tsize_t to uint32 to be able to work with data arrays larger than 2GB.
    Fixes bug http://bugzilla.remotesensing.org/show_bug.cgi?id=89 Idea
    submitted by Matt Hancher.
  * tif_dir.c: Workaround for incorrect TIFFs with ExtraSamples == 999
    produced by Corel Draw. As per bug
    http://bugzilla.remotesensing.org/show_bug.cgi?id=1490
  * tif_write.c: TIFFAppendToStrip() - clear sorted flag if we move a
    strip. http://bugzilla.remotesensing.org/show_bug.cgi?id=1359
  * tif_fax3.c: Save the state of printdir codec dependent method.
  * tif_jpeg.c: Save the state of printdir codec dependent method as per
    bug http://bugzilla.remotesensing.org/show_bug.cgi?id=1273
  * tif_win32.c: Fixed problem with offset value manipulation as per bug
    http://bugzilla.remotesensing.org/show_bug.cgi?id=1322
  * tif_fax3.c, tif_next.c, tif_pixarlog.c: Fixed multiple
    vulnerabilities, as per Gentoo bug ():
    http://bugs.gentoo.org/show_bug.cgi?id=142383
  * tif_lzw.c, tif_zip.c: Fixed problems with mixing encoding and decoding
    on the same read-write TIFF handle. The LZW code can now maintain
    encode and decode state at the same time. The ZIP code will switch
    back and forth as needed.
    http://bugzilla.remotesensing.org/show_bug.cgi?id=757
  * tif_msdos.c: Avoid handle leak for failed opens. c/o Thierry Pierron
  * tif_dirwrite.c: take care not to flush out buffer of strip/tile data
    in _TIFFWriteDirectory if TIFF_BEENWRITING not set. Relates to bug
    report by Peng Gao with black strip at bottom of images.
  * tif_dirwrite.c: make sure to use uint32 for wordcount in
    TIFFWriteNormanTag if writecount is VARIABLE2 for ASCII fields. It
    already seems to have been done for other field types. Needed for
    "tiffset" on files with geotiff ascii text.
  * tif_dirinfo.c: Added missed EXIF tag ColorSpace (40961).
  * tif_dirread.c: Move IFD fetching code in the separate function
    TIFFFetchDirectory() avoiding code duplication in TIFFReadDirectory()
    and TIFFReadCustomDirectory().
  * tif_readdir.c: Added case in EstimateStripByteCounts() for tiled
    files. Modified TIFFReadDirectory() to not invoke
    EstimateStripByteCounts() for case where entry 0 and 1 are unequal but
    one of them is zero.
    http://bugzilla.remotesensing.org/show_bug.cgi?id=1204
  * tif_open.c, tif_dirread.c, tiffiop.h: Move IFD looping checking code
    in the separate function TIFFCheckDirOffset().
  * tif_aux.c: Added _TIFFCheckRealloc() function.
  * tif_fax3.c: Fixed problems in fax decoder as per bug
    http://bugzilla.remotesensing.org/show_bug.cgi?id=1194
  * tif_jbig.c: Added support for JBIG compression scheme (34661 code)
    contributed by Lee Howard. As per bug
    http://bugzilla.remotesensing.org/show_bug.cgi?id=896
  * tif_getimage.c: Added support for planarconfig separate non-subsampled
    YCbCr (i.e. separate YCbCr with subsampling [1,1]).
  * tif_getimage.c: Revision of all RGB(A) put routines:
       * Conversion of unassociated alpha to associated alpha now done
         with more performant LUT, and calculation more correct.
       * Conversion of 16bit data to 8bit data now done with more
         performant LUT, and calculation more correct
       * Bugfix of handling of 16bit RGB with unassociated alpha
  * tif_ojpeg.c: totally new implementation
  * tif_getimage.c: removed TIFFTAG_JPEGCOLORMODE handling of OJPEG images
    in favor of tif_getimage.c native handling of YCbCr and desubsampling.
  * tif_jpeg.c: JPEGVSetField() so that altering the photometric
    interpretation causes the "upsampled" flag to be recomputed. Fixes
    peculiar bug where photometric flag had to be set before jpegcolormode
    flag.

------------------------------------------------

CHANGES IN THE TOOLS:
  * tiff2ps.c: Added support 16-bit images as per bug
    http://bugzilla.remotesensing.org/show_bug.cgi?id=1566. Patch from
    William Bader.
  * tiff2pdf.c: Fix for TIFFTAG_JPEGTABLES tag fetching and significant
    upgrade of the whole utility as per bug
    http://bugzilla.remotesensing.org/show_bug.cgi?id=1560. Now we don't
    need tiffiop.h in tiff2pdf anymore and will open output PDF file using
    TIFFClientOpen() machinery as it is implemented by Leon Bottou.
  * tiffcrop.c: New tiffcrop utility contributed by Richard Nolde. As per
    bug http://bugzilla.remotesensing.org/show_bug.cgi?id=1383
  * tiff2pdf.c: Do not assume inches when the resolution units do not
    specified. As per bug
    http://bugzilla.remotesensing.org/show_bug.cgi?id=1366
  * tiffset.c: Properly handle tags with TIFF_VARIABLE writecount. As per
    bug http://bugzilla.remotesensing.org/show_bug.cgi?id=1350
  * tif2rgba.c: This utility does not work properly on big-endian
    architectures. It was fixed including the bug
    http://bugzilla.remotesensing.org/show_bug.cgi?id=1149
  * tiff2pdf.c: Fix handling of -q values.
    http://bugzilla.remotesensing.org/show_bug.cgi?id=587
  * tiffcmp.c: Fixed floating point comparison logic as per bug
    http://bugzilla.remotesensing.org/show_bug.cgi?id=1191
  * tiff2pdf.c: Fixed buffer overflow condition in t2p_write_pdf_string()
    as per bug http://bugzilla.remotesensing.org/show_bug.cgi?id=1196

------------------------------------------------

CHANGES IN THE CONTRIB AREA:
  * contrib/addtiffo/tif_overview.c: Fix problems with odd sized output
    blocks in TIFF_DownSample_Subsampled() (bug 1542).
  * contrib/dbs/xtiff/xtiff.c: Make xtiff utility compilable. Though it is
    still far from the state of being working and useful.
2009-08-24 08:50:33 +00:00
tron
36bc447ab2 Apply fix for integer overflows in various inter-color space conversion
tools taken from MapTools Bugzilla. This fixes CVE-2009-2347.
2009-07-19 11:45:09 +00:00
drochner
55feadba01 add a patch from upstream
(http://bugzilla.maptools.org/show_bug.cgi?id=2065)
to fix a buffer underflow which can cause DOS or system access
(SA35515)
bump PKGREVISION
2009-06-22 14:54:44 +00:00
tron
6578630dc9 Apply Debian's fix for the security vulnerability reported in
CVE-2008-2327. Bump package revision.
2008-08-30 08:12:45 +00:00