naddy
21a6eb6a66
Reinstate the interlibrary dependencies, fix .pc files.
...
Parts/help/input from brad@
2013-03-27 16:37:09 +00:00
jasper
a6f7cc5f4f
Security fix for CVE-2012-4564
...
libtiff: Missing return value check in ppm2tiff leading to heap-buffer overflow when reading a tiff file
ok naddy@
2012-11-06 21:31:06 +00:00
naddy
be5efd77b8
Update to 4.0.3.
...
* A number of security issues have been resolved, including CVE-2012-3401.
* Accessor functions for TIFF field information have been added to
support functionality which was available in libtiff 3.9.X.
ok jasper@
2012-09-24 19:51:03 +00:00
jasper
06cec91f2a
Update tiff to 4.0.2, includes a fix for CVE-2012-2113,
...
LibTIFF "tiff2pdf" Integer Overflow Vulnerability
2012-06-27 14:27:02 +00:00
naddy
5cab5c465d
Major update to 4.0.1, which adds BigTIFF support and includes some API
...
changes. Also include upstream fix for CVE-2012-1173.
2012-04-14 15:09:55 +00:00
naddy
1a6a73c4b1
SECURITY fix for CVE-2012-1173 (integer overflow).
...
From upstream, via Sebastien Marie.
http://bugzilla.maptools.org/show_bug.cgi?id=2369
2012-04-09 17:35:38 +00:00
naddy
5a919588de
maintenance update to 3.9.6
2012-04-09 17:21:05 +00:00
giovanni
c4a6085cf3
Update to 3.9.5, help and ok naddy@
2011-05-09 08:14:43 +00:00
jasper
917a1f2f5b
Security fix for CVE-2011-1167, libtiff heap-based buffer overflow
2011-03-23 08:08:50 +00:00
jasper
d5d6a98846
Security fix for CVE-2011-0192: buffer overflow in Fax4Decode.
2011-03-19 18:41:05 +00:00
naddy
12aaddf055
SECURITY:
...
Update to 3.9.4, which includes fixes for CVE-2009-2347 and CVE-2010-1411.
2010-06-30 17:10:07 +00:00
jasper
5bd6d49b4a
- SECURITY FIX for CVE-2009-2347 (integer overflows in tiff tools)
...
patch taken from upstream bugreport:
http://bugzilla.maptools.org/show_bug.cgi?id=2079
ok ajacoutot@
2009-07-22 13:15:00 +00:00
jasper
72d0a18369
SECURITY FIX for for SA35515,
...
LibTIFF "LZWDecodeCompat()" Buffer Underflow Vulnerability
Patch from upstream bugreport #2065 (committed to CVS).
2009-06-23 07:49:31 +00:00
naddy
cdd487f6df
fix a silly C99-ism to allow building with gcc2
2009-03-07 15:31:57 +00:00
naddy
fab96bfad1
SECURITY fixes for CVE-2006-2656 and CVE-2006-3459 through 3465.
...
Man page fixes.
Mostly via FreeBSD. Approving noises from bernd@ and jasper@
2008-10-25 09:39:29 +00:00
jasper
2247677749
Security fix for SA31610
...
http://secunia.com/advisories/31610
LibTIFF LZW Decoder Buffer Underflow Vulnerability
Patch extracted from Debian's tiff_3.8.2-7+etch1
"looks fine" ajacoutot@
2008-08-27 18:09:36 +00:00
naddy
06de83c3cc
SECURITY:
...
Prevent sign extension on integer promotion that leads to a buffer overflow.
Minimal fix from upstream CVS. CVE-2006-2193.
prodded by bernd@
2006-06-12 17:31:34 +00:00
espie
c7e0f26245
fix broken manpages, found out because makewhatis was complaining...
2006-03-26 10:45:18 +00:00
naddy
ce1884601e
update to 3.8.1
2006-03-18 17:40:02 +00:00
naddy
520b48f4f7
Update to 3.7.3; from Bernd Ahlers <b.ahlers@ba-net.org>.
...
Major changes:
* Replace runtime endianess check with the compile time one.
* Added support for the new predictor type (floating point predictor),
defined at the TIFF Technical Note 3.
* Added Support for custom tags, passed by value. Added support for
all DNG tags.
2005-07-17 20:54:36 +00:00
naddy
de027632ac
update to 3.7.2 which integrates the numerous security patches
...
brad@ drops maintainership
2005-06-18 21:24:40 +00:00
brad
b8e705b1c2
missed part of the alpha channels fix.
2005-03-27 06:13:07 +00:00
brad
7faf47bc10
fix an issue with not being able to open some valid TIFF files.
...
http://www.sigmasoft.com/~openbsd/archive/openbsd-ports/200503/msg00090.html
From: Bernd Ahlers <b dot ahlers at ba-net dot org>
2005-03-27 05:12:15 +00:00
brad
7222db8f0e
Integer overflow in tif_dirread.c and tif_fax3.c for libtiff allows remote
...
attackers to execute arbitrary code via a TIFF file containing a TIFF_ASCII
or TIFF_UNDEFINED directory entry with a -1 entry count, which leads to a
heap-based buffer overflow.
CAN-2004-1308
2005-03-27 03:57:26 +00:00
brad
b9b5b63414
Integer overflow in the tiffdump utility for libtiff allows remote
...
attackers to cause a denial of service (application crash) and
possibly execute arbitrary code via a crafted TIFF file.
CAN-2004-1183
2005-03-27 03:41:26 +00:00
brad
9b61f5a211
fix an issue with alpha channels.
...
http://bugzilla.remotesensing.org/show_bug.cgi?id=718
2005-03-27 03:40:00 +00:00
brad
f81e2e0341
Fix memory allocation problems and numerous integer overflows.
...
CAN-2004-0803, CAN-2004-0804, CAN-2004-0886
2004-10-20 20:37:48 +00:00
brad
0b0e7ff81a
Add a patch to fix libtiff 3.6.1 with HylaFAX.
...
http://bugs.hylafax.org/bugzilla/show_bug.cgi?id=500
http://bugzilla.remotesensing.org/show_bug.cgi?id=483
Thanks to Uwe Dippel <udippel at uniten dot edu dot my> for
bringing this to my attention.
2004-05-18 23:35:35 +00:00
brad
96a525ea1f
upgrade to libtiff 3.6.1
2004-02-25 00:08:10 +00:00
naddy
1bc6d8a294
remove workarounds for gcc2.95/sparc64 optimizer bugs
2004-02-24 00:06:43 +00:00
brad
98095a8a2c
argh, damn cvs. this should have been updated and not removed.
2003-12-23 23:48:55 +00:00
brad
f01fb70235
upgrade to libtiff 3.6.0
2003-12-23 23:45:41 +00:00
avsm
cf7460a4c4
incomplete format string; submitted upstream, brad@ ok
2003-04-15 15:30:52 +00:00
brad
f8031cbdfb
better
2002-01-24 15:13:47 +00:00
brad
0bf25427d0
- add workaround for optimization bug in GCC for sparc64; problem pointed out by marc@
...
- fpic -> fPIC for sparc64
2002-01-24 04:55:50 +00:00
brad
8050cf7066
damn cvs, this was not supposed to be removed
2002-01-19 17:50:13 +00:00
brad
2bd845dea8
upgrade to libtiff 3.5.7
2002-01-19 09:34:42 +00:00
brad
092746fb44
Use our in-tree copy instead of patching the one that comes with libtiff.
2001-10-10 19:28:50 +00:00
wilfried
97034e70a2
use -fPIC rather than -fpic
...
regenerate the patches with update-patches
ok naddy@
2001-10-10 15:15:00 +00:00
pvalchev
605ad5eab3
alpha does have shared libraries now; repair
2001-10-08 05:27:00 +00:00
brad
a72f4e812e
pass the pic flag along to the compiler when linking the shared library.
2000-10-19 11:56:02 +00:00
brad
fc21c35236
use "cc -shared" for the creation of shared libraries
2000-09-26 06:34:18 +00:00
brad
29ee8e9fc2
enable creation of shared libraries on powerpc
2000-09-26 06:24:17 +00:00
fgsch
394f6bf943
Update to tiff 3.5.5; see www.libtiff.org/v3.5.5.html for changelog.
2000-05-21 10:57:40 +00:00
espie
dd104576f5
Fake... a bit more hairy, since tiff is writing Makefiles at a weird point.
2000-03-06 16:48:26 +00:00
brad
4df1762c75
strip tools binaries when installing them
2000-01-23 21:04:49 +00:00
brad
48ace64959
upgrade to libtiff 3.5.4, biggest change:
...
- Removed LZW Compression to comply with Unisys patent extortion
- Changed default compression in tools to TIFF_PACKBITS, and changed usage
descriptions in tools to reflect removal of LZW compression
- Added Pixar tag support
2000-01-01 21:28:30 +00:00
brad
0192668870
stop tiff from creating an unnecessary sym link durring install
1999-11-04 23:19:46 +00:00
brad
58569be24a
add libtiff v3.5.2
1999-10-26 22:05:20 +00:00
marc
b3aac7c901
1) remove tiff from graphics makefile as there is nothing to make
...
2) change tiff/Makefile to spit out message saying to use tiff34
remove all tiff files, patches, and pkg data; they're no longer needed
3) install tiff34 as libtiff, tiff.h, and tiffio.h; add symbolic links
so the old names of libtiff34, tiff34.h, and tiffio34.h still work.
4) Change ImageMagick to use -ltiff, not -ltiff34; remove the patch
files and directory as they are no longer needed.
5) Change gimp to use -ltiff, not -ltiff34; remove the patch files and
directory as they are no longer needed.
NOTE: with these changes ImageMagick and gimp require the updated tiff34
port.
1998-06-10 02:56:11 +00:00