Commit Graph

52 Commits

Author SHA1 Message Date
naddy
21a6eb6a66 Reinstate the interlibrary dependencies, fix .pc files.
Parts/help/input from brad@
2013-03-27 16:37:09 +00:00
jasper
a6f7cc5f4f Security fix for CVE-2012-4564
libtiff: Missing return value check in ppm2tiff leading to heap-buffer overflow when reading a tiff file

ok naddy@
2012-11-06 21:31:06 +00:00
naddy
be5efd77b8 Update to 4.0.3.
* A number of security issues have been resolved, including CVE-2012-3401.
* Accessor functions for TIFF field information have been added to
  support functionality which was available in libtiff 3.9.X.

ok jasper@
2012-09-24 19:51:03 +00:00
jasper
06cec91f2a Update tiff to 4.0.2, includes a fix for CVE-2012-2113,
LibTIFF "tiff2pdf" Integer Overflow Vulnerability
2012-06-27 14:27:02 +00:00
naddy
5cab5c465d Major update to 4.0.1, which adds BigTIFF support and includes some API
changes.  Also include upstream fix for CVE-2012-1173.
2012-04-14 15:09:55 +00:00
naddy
1a6a73c4b1 SECURITY fix for CVE-2012-1173 (integer overflow).
From upstream, via Sebastien Marie.
http://bugzilla.maptools.org/show_bug.cgi?id=2369
2012-04-09 17:35:38 +00:00
naddy
5a919588de maintenance update to 3.9.6 2012-04-09 17:21:05 +00:00
giovanni
c4a6085cf3 Update to 3.9.5, help and ok naddy@ 2011-05-09 08:14:43 +00:00
jasper
917a1f2f5b Security fix for CVE-2011-1167, libtiff heap-based buffer overflow 2011-03-23 08:08:50 +00:00
jasper
d5d6a98846 Security fix for CVE-2011-0192: buffer overflow in Fax4Decode. 2011-03-19 18:41:05 +00:00
naddy
12aaddf055 SECURITY:
Update to 3.9.4, which includes fixes for CVE-2009-2347 and CVE-2010-1411.
2010-06-30 17:10:07 +00:00
jasper
5bd6d49b4a - SECURITY FIX for CVE-2009-2347 (integer overflows in tiff tools)
patch taken from upstream bugreport:
http://bugzilla.maptools.org/show_bug.cgi?id=2079

ok ajacoutot@
2009-07-22 13:15:00 +00:00
jasper
72d0a18369 SECURITY FIX for for SA35515,
LibTIFF "LZWDecodeCompat()" Buffer Underflow Vulnerability

Patch from upstream bugreport #2065 (committed to CVS).
2009-06-23 07:49:31 +00:00
naddy
cdd487f6df fix a silly C99-ism to allow building with gcc2 2009-03-07 15:31:57 +00:00
naddy
fab96bfad1 SECURITY fixes for CVE-2006-2656 and CVE-2006-3459 through 3465.
Man page fixes.

Mostly via FreeBSD.  Approving noises from bernd@ and jasper@
2008-10-25 09:39:29 +00:00
jasper
2247677749 Security fix for SA31610
http://secunia.com/advisories/31610
LibTIFF LZW Decoder Buffer Underflow Vulnerability

Patch extracted from Debian's tiff_3.8.2-7+etch1

"looks fine" ajacoutot@
2008-08-27 18:09:36 +00:00
naddy
06de83c3cc SECURITY:
Prevent sign extension on integer promotion that leads to a buffer overflow.
Minimal fix from upstream CVS.  CVE-2006-2193.
prodded by bernd@
2006-06-12 17:31:34 +00:00
espie
c7e0f26245 fix broken manpages, found out because makewhatis was complaining... 2006-03-26 10:45:18 +00:00
naddy
ce1884601e update to 3.8.1 2006-03-18 17:40:02 +00:00
naddy
520b48f4f7 Update to 3.7.3; from Bernd Ahlers <b.ahlers@ba-net.org>.
Major changes:
* Replace runtime endianess check with the compile time one.
* Added support for the new predictor type (floating point predictor),
  defined at the TIFF Technical Note 3.
* Added Support for custom tags, passed by value. Added support for
  all DNG tags.
2005-07-17 20:54:36 +00:00
naddy
de027632ac update to 3.7.2 which integrates the numerous security patches
brad@ drops maintainership
2005-06-18 21:24:40 +00:00
brad
b8e705b1c2 missed part of the alpha channels fix. 2005-03-27 06:13:07 +00:00
brad
7faf47bc10 fix an issue with not being able to open some valid TIFF files.
http://www.sigmasoft.com/~openbsd/archive/openbsd-ports/200503/msg00090.html

From: Bernd Ahlers <b dot ahlers at ba-net dot org>
2005-03-27 05:12:15 +00:00
brad
7222db8f0e Integer overflow in tif_dirread.c and tif_fax3.c for libtiff allows remote
attackers to execute arbitrary code via a TIFF file containing a TIFF_ASCII
or TIFF_UNDEFINED directory entry with a -1 entry count, which leads to a
heap-based buffer overflow.

CAN-2004-1308
2005-03-27 03:57:26 +00:00
brad
b9b5b63414 Integer overflow in the tiffdump utility for libtiff allows remote
attackers to cause a denial of service (application crash) and
possibly execute arbitrary code via a crafted TIFF file.

CAN-2004-1183
2005-03-27 03:41:26 +00:00
brad
9b61f5a211 fix an issue with alpha channels.
http://bugzilla.remotesensing.org/show_bug.cgi?id=718
2005-03-27 03:40:00 +00:00
brad
f81e2e0341 Fix memory allocation problems and numerous integer overflows.
CAN-2004-0803, CAN-2004-0804, CAN-2004-0886
2004-10-20 20:37:48 +00:00
brad
0b0e7ff81a Add a patch to fix libtiff 3.6.1 with HylaFAX.
http://bugs.hylafax.org/bugzilla/show_bug.cgi?id=500
http://bugzilla.remotesensing.org/show_bug.cgi?id=483

Thanks to Uwe Dippel <udippel at uniten dot edu dot my> for
bringing this to my attention.
2004-05-18 23:35:35 +00:00
brad
96a525ea1f upgrade to libtiff 3.6.1 2004-02-25 00:08:10 +00:00
naddy
1bc6d8a294 remove workarounds for gcc2.95/sparc64 optimizer bugs 2004-02-24 00:06:43 +00:00
brad
98095a8a2c argh, damn cvs. this should have been updated and not removed. 2003-12-23 23:48:55 +00:00
brad
f01fb70235 upgrade to libtiff 3.6.0 2003-12-23 23:45:41 +00:00
avsm
cf7460a4c4 incomplete format string; submitted upstream, brad@ ok 2003-04-15 15:30:52 +00:00
brad
f8031cbdfb better 2002-01-24 15:13:47 +00:00
brad
0bf25427d0 - add workaround for optimization bug in GCC for sparc64; problem pointed out by marc@
- fpic -> fPIC for sparc64
2002-01-24 04:55:50 +00:00
brad
8050cf7066 damn cvs, this was not supposed to be removed 2002-01-19 17:50:13 +00:00
brad
2bd845dea8 upgrade to libtiff 3.5.7 2002-01-19 09:34:42 +00:00
brad
092746fb44 Use our in-tree copy instead of patching the one that comes with libtiff. 2001-10-10 19:28:50 +00:00
wilfried
97034e70a2 use -fPIC rather than -fpic
regenerate the patches with update-patches
ok naddy@
2001-10-10 15:15:00 +00:00
pvalchev
605ad5eab3 alpha does have shared libraries now; repair 2001-10-08 05:27:00 +00:00
brad
a72f4e812e pass the pic flag along to the compiler when linking the shared library. 2000-10-19 11:56:02 +00:00
brad
fc21c35236 use "cc -shared" for the creation of shared libraries 2000-09-26 06:34:18 +00:00
brad
29ee8e9fc2 enable creation of shared libraries on powerpc 2000-09-26 06:24:17 +00:00
fgsch
394f6bf943 Update to tiff 3.5.5; see www.libtiff.org/v3.5.5.html for changelog. 2000-05-21 10:57:40 +00:00
espie
dd104576f5 Fake... a bit more hairy, since tiff is writing Makefiles at a weird point. 2000-03-06 16:48:26 +00:00
brad
4df1762c75 strip tools binaries when installing them 2000-01-23 21:04:49 +00:00
brad
48ace64959 upgrade to libtiff 3.5.4, biggest change:
- Removed LZW Compression to comply with Unisys patent extortion
- Changed default compression in tools to TIFF_PACKBITS, and changed usage
descriptions in tools to reflect removal of LZW compression
- Added Pixar tag support
2000-01-01 21:28:30 +00:00
brad
0192668870 stop tiff from creating an unnecessary sym link durring install 1999-11-04 23:19:46 +00:00
brad
58569be24a add libtiff v3.5.2 1999-10-26 22:05:20 +00:00
marc
b3aac7c901 1) remove tiff from graphics makefile as there is nothing to make
2) change tiff/Makefile to spit out message saying to use tiff34
   remove all tiff files, patches, and pkg data; they're no longer needed
3) install tiff34 as libtiff, tiff.h, and tiffio.h; add symbolic links
   so the old names of libtiff34, tiff34.h, and tiffio34.h still work.
4) Change ImageMagick to use -ltiff, not -ltiff34; remove the patch
   files and directory as they are no longer needed.
5) Change gimp to use -ltiff, not -ltiff34; remove the patch files and
   directory as they are no longer needed.

NOTE: with these changes ImageMagick and gimp require the updated tiff34
      port.
1998-06-10 02:56:11 +00:00