-
tiff (4.5.1+git230720-4) unstable; urgency=high
* Backport security fix for CVE-2023-52355, an out-of-memory flaw that
could be triggered by passing a crafted tiff file with documentation
update how to prevent it.
* Backport security fix for CVE-2023-52356, a segment fault flaw that
could be triggered by passing a crafted tiff file (closes: #1061524).
-- Laszlo Boszormenyi (GCS) <email address hidden> Sat, 27 Jan 2024 10:32:25 +0100
-
tiff (4.5.1+git230720-3) unstable; urgency=medium
* Mark break on versions of libimager-perl that don't work with this tiff
version (closes: #1057326).
* Update Standards-Version to 4.6.2 .
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 03 Dec 2023 15:16:24 +0100
-
tiff (4.5.1+git230720-2) unstable; urgency=high
* Backport security fix for CVE-2023-6277, passing a crafted tiff file to
TIFFOpen() API may allow a remote attacker to cause a denial of service
(closes: #1056751).
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 26 Nov 2023 10:25:48 +0100
-
tiff (4.5.1+git230720-1) unstable; urgency=medium
* Git snapshot, fixing the following security issues:
- fix TransferFunction writing of only two transfer functions,
- TIFFReadDirectory(): fix crash when reading tag TIFFTAG_EP_BATTERYLEVEL,
- WebP decoder: validate WebP blob width, height, band count against
TIFF parameters,
- TIFFReadDirectoryCheckOrder(): avoid integer overflow,
- tiffcp: fix memory corruption (overflow) on hostile images,
- raw2tiff: fix integer overflow and bypass of the check.
-- Laszlo Boszormenyi (GCS) <email address hidden> Sat, 29 Jul 2023 23:36:42 +0200
-
tiff (4.5.1-1) unstable; urgency=medium
* New upstream release.
-- Laszlo Boszormenyi (GCS) <email address hidden> Wed, 21 Jun 2023 17:49:37 +0200
-
tiff (4.5.1~rc3-1) unstable; urgency=medium
* New upstream release candidate version.
-- Laszlo Boszormenyi (GCS) <email address hidden> Mon, 12 Jun 2023 21:56:31 +0200
-
tiff (4.5.0-6) unstable; urgency=high
* Backport security fix for CVE-2023-2731, NULL pointer dereference flaw in
LZWDecode() (closes: #1036282).
-- Laszlo Boszormenyi (GCS) <email address hidden> Thu, 18 May 2023 18:20:39 +0200
-
tiff (4.5.0-5) unstable; urgency=high
* Backport fix for tiffcrop correctly update buffersize after
rotateImage() .
* Backport fix for TIFFClose() avoid NULL pointer dereferencing.
* Backport security fix for CVE-2023-0800, CVE-2023-0801, CVE-2023-0802,
CVE-2023-0803 and CVE-2023-0804, an out-of-bounds write in tiffcrop
allows attackers to cause a denial-of-service via a crafted tiff file.
* Backport security fix for CVE-2023-0795, CVE-2023-0796, CVE-2023-0797,
CVE-2023-0798 and CVE-2023-0799, an out-of-bounds read in tiffcrop allows
attackers to cause a denial-of-service via a crafted tiff file.
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 19 Feb 2023 08:46:38 +0100
-
tiff (4.5.0-4) unstable; urgency=high
* Backport security fix for CVE-2022-48281, heap-based buffer overflow in
processCropSelections() (closes: #1029653).
-- Laszlo Boszormenyi (GCS) <email address hidden> Wed, 25 Jan 2023 18:28:55 +0100
-
tiff (4.5.0-3) unstable; urgency=medium
* Don't use smartquotes for Sphinx (closes: #1028456).
-- Laszlo Boszormenyi (GCS) <email address hidden> Thu, 12 Jan 2023 17:45:09 +0100
-
tiff (4.5.0-2) unstable; urgency=medium
* Upload to Sid.
-- Laszlo Boszormenyi (GCS) <email address hidden> Tue, 10 Jan 2023 23:02:27 +0100
-
tiff (4.4.0-6) unstable; urgency=high
* Backport security fix for CVE-2022-2519, double free or corruption in
rotateImage() (closes: #1024670).
* Backport security fix for CVE-2022-2520, sysmalloc assertion fail in
rotateImage().
* Backport security fix for CVE-2022-2521, invalid pointer free operation
in TIFFClose().
* Backport security fix for CVE-2022-2953, out-of-bounds read in
extractImageSection().
* Backport security fix for CVE-2022-3970, fix (unsigned) integer overflow
on strips/tiles > 2 GB in TIFFReadRGBATileExt() (closes: #1024737).
-- Laszlo Boszormenyi (GCS) <email address hidden> Thu, 24 Nov 2022 17:54:18 +0100
-
tiff (4.4.0-5) unstable; urgency=high
* Backport security fix for CVE-2022-3597, CVE-2022-3626 and CVE-2022-3627,
out of bounds write and denial of service via a crafted TIFF file.
* Backport security fix for CVE-2022-3570, multiple heap buffer overflows
via crafted TIFF file.
* Backport security fix for CVE-2022-3599, denial-of-service via a crafted
TIFF file.
* Backport security fix for CVE-2022-3598, denial-of-service via a crafted
TIFF file (closes: #1022555).
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 23 Oct 2022 22:38:15 +0200
-
tiff (4.4.0-4) unstable; urgency=high
* Backport security fix for CVE-2022-34526, denial of service via a crafted
TIFF file.
-- Laszlo Boszormenyi (GCS) <email address hidden> Sat, 06 Aug 2022 15:19:15 +0200
-
tiff (4.4.0-3) unstable; urgency=high
* Backport security fix for CVE-2022-2056, CVE-2022-2057 and CVE-2022-2058,
divide by zero error in tiffcrop (closes: #1014494).
* Update libtiff5 symbols.
-- Laszlo Boszormenyi (GCS) <email address hidden> Fri, 08 Jul 2022 19:02:43 +0200
-
tiff (4.4.0-2) unstable; urgency=medium
* Adjust library symbols with LERC build architectures.
-- Laszlo Boszormenyi (GCS) <email address hidden> Mon, 30 May 2022 18:04:05 +0200
-
tiff (4.4.0-1) unstable; urgency=medium
* New upstream release.
* Backport upstream fix for adding 4.4.0 changes file to documentation.
* Build with LERC compression support (closes: #990789).
* Update libtiff5 symbols.
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 29 May 2022 12:28:49 +0200
-
tiff (4.4.0~rc1-1) unstable; urgency=medium
* New upstream release candidate version.
* Update libtiff5 symbols.
* Update watch file.
-- Laszlo Boszormenyi (GCS) <email address hidden> Sat, 21 May 2022 15:41:44 +0200
-
tiff (4.3.0-8) unstable; urgency=high
* Backport correct security fix for CVE-2022-1355, stack buffer overflow in
"mode" string (closes: #1011160).
-- Laszlo Boszormenyi (GCS) <email address hidden> Tue, 17 May 2022 21:38:14 +0200
-
tiff (4.3.0-7) unstable; urgency=high
* Backport security fix for CVE-2022-1354, heap buffer overflow in
TIFFReadRawDataStriped().
* Fix segmentation fault printing GPS directory if Altitude tag is present.
* Fix segmentation fault due to field_name=NULL.
* Backport security fix for CVE-2022-1355, stack buffer overflow in "mode"
string.
* Update libtiff5 symbols.
-- Laszlo Boszormenyi (GCS) <email address hidden> Mon, 25 Apr 2022 22:24:06 +0200
-
tiff (4.3.0-6) unstable; urgency=high
* Backport security fix for CVE-2022-0908, null source pointer passed as an
argument to memcpy() function within TIFFFetchNormalTag().
* Backport security fix for CVE-2022-0907, unchecked return value to null
pointer dereference in tiffcrop.
* Backport security fix for CVE-2022-0909, divide by zero error in
tiffcrop.
* Backport security fix for CVE-2022-0891, heap buffer overflow in
ExtractImageSection function in tiffcrop.
* Backport security fix for CVE-2022-0924, heap buffer overflow in tiffcp.
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 13 Mar 2022 11:00:15 +0100
-
tiff (4.3.0-5) unstable; urgency=high
* Backport security fix for CVE-2022-0865, crash when reading a file with
multiple IFD in memory-mapped mode and when bit reversal is needed.
-- Laszlo Boszormenyi (GCS) <email address hidden> Mon, 07 Mar 2022 22:23:21 +0100
-
tiff (4.3.0-4) unstable; urgency=high
* Backport security fix for CVE-2022-0561, TIFFFetchStripThing(): avoid
calling memcpy() with a null source pointer and size of zero.
* Backport security fix for CVE-2022-0562, TIFFReadDirectory(): avoid
calling memcpy() with a null source pointer and size of zero.
-- Laszlo Boszormenyi (GCS) <email address hidden> Sat, 12 Feb 2022 21:21:45 +0100
-
tiff (4.3.0-3) unstable; urgency=high
* Backport security fix for CVE-2022-22844: global-buffer-overflow for
ASCII tags where count is required.
[ Helmut Grohne <email address hidden> ]
* Drop unused Build-Depends: libxmu-dev (closes: #981265).
-- Laszlo Boszormenyi (GCS) <email address hidden> Wed, 26 Jan 2022 17:49:14 +0100
-
tiff (4.3.0-2) unstable; urgency=medium
* Upload to Sid.
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 05 Sep 2021 19:25:09 +0200
-
tiff (4.2.0-1) unstable; urgency=medium
* New upstream release.
-- Laszlo Boszormenyi (GCS) <email address hidden> Mon, 21 Dec 2020 15:06:46 +0100
-
tiff (4.1.0+git201212-1) unstable; urgency=high
* Git snapshot, fixing the following security issues:
- TIFFSetupStrips: enforce 2GB limitation of
Strip/Tile Offsets/ByteCounts arrays,
- tiff2ps: fix heap buffer read overflow in PSDataColorContig() ,
- tiff2pdf: palette bound check in t2p_sample_realize_palette() ,
- tiffcrop: fix asan runtime error caused by integer promotion,
- raw2tiff: avoid divide by zero,
- tif_fax3.c: check buffer overflow in Fax4Decode() ,
- tif_fax3: better fix for CVE-2011-0192,
- TIFFReadCustomDirectory(): fix potential heap buffer overflow when
reading a custom directory, after a regular directory where a codec was
active,
- tif_fax3.h: check for buffer overflow in EXPAND2D before "calling"
CLEANUP_RUNS() ,
- contrib/win_dib/tiff2dib: fix uninitialized variable: lpBits,
- Fax3SetupState(): check consistency of rowbytes and rowpixels,
potential heap overflow in tiff2pdf,
- tiff2pdf: avoid divide by zero, use-after-free in t2p_writeproc()
function,
- tiffcp/tiff2pdf/tiff2ps: enforce maximum malloc size,
- tif_fax3: more buffer overflow checks in Fax3Decode2D() ,
- tiffset: check memory allocation, use of allocated memory without null
pointer check,
- tiffdump: avoid unaligned memory access,
- tiff2pdf: normalizePoint() macro to normalize the white point, avoid
divide by zero,
- tif_fax3: quit Fax3Decode2D() when a buffer overflow occurs,
- tiffcrop: enforce memory allocation limit,
- tiffinfo: fix dump of Tiled images, heap out of bounds read in
TIFFReadRawData() ,
- Fax3PreDecode(): reset curruns and refruns state variables,
heap-buffer-overflow in Fax3Decode2D() ,
- tif_fax3.h: extra buffer overflow checks, heap-buffer-overflow in
Fax3Decode2D() ,
- TIFFStartStrip(): avoid potential crash in WebP codec when using
scanline access on corrupted files,
- gtTileContig(): check Tile width for overflow,
- avoid buffer overflow while writing jpeg end of file marker,
- tiff2ps.c: fix buffer overread, heap-buffer-overflow in PSDataBW() ,
- fix potential overflow in gtStripContig() ,
- more overflow fixes for large width,
- enforce (configurable) memory limit in tiff2rgba,
- tiff2pdf: enforce memory limit for tiled pictures,
- tiffcrop: fix buffer overrun in extractContigSamples24bits() .
* Build with libdeflate support.
* Update libtiff5 symbols.
* Update debhelper level to 13 .
* Update Standards-Version to 4.5.1 .
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 13 Dec 2020 07:52:33 +0100
-
tiff (4.1.0+git191117-2) unstable; urgency=medium
* Backport upstream fix for rowsperstrip parse regression in
OJPEGReadHeaderInfo() (closes: #945402).
-- Laszlo Boszormenyi (GCS) <email address hidden> Wed, 08 Jan 2020 15:47:02 +0000
-
tiff (4.1.0+git191117-1) unstable; urgency=medium
* Git snapshot, fixing the following issues:
- missing TIFFClose in rgb2ycbcr tool,
- missing checks on TIFFGetField in tiffcrop tool,
- broken sanity check in OJPEG,
- missing generated .sh files for tests.
-- Laszlo Boszormenyi (GCS) <email address hidden> Mon, 18 Nov 2019 18:02:46 +0000
-
tiff (4.1.0-1) unstable; urgency=medium
* New upstream release.
* Update Standards-Version to 4.4.1 .
-- Laszlo Boszormenyi (GCS) <email address hidden> Tue, 05 Nov 2019 16:26:48 +0000
-
tiff (4.0.10+git191003-1) unstable; urgency=high
* Git snapshot, fixing the following security issue:
- TIFFReadAndRealloc(): avoid too large memory allocation attempts.
-- Laszlo Boszormenyi (GCS) <email address hidden> Thu, 03 Oct 2019 22:00:39 +0000
-
tiff (4.0.10+git190903-1) unstable; urgency=high
* Git snapshot, fixing the following security issues:
- setByteArray(): avoid potential signed integer overflow,
- EstimateStripByteCounts(): avoid several unsigned integer overflows,
- tif_ojpeg: avoid two unsigned integer overflows,
- OJPEGWriteHeaderInfo(): avoid unsigned integer overflow on strile
dimensions close to UINT32_MAX,
- _TIFFPartialReadStripArray(): avoid unsigned integer overflow,
- JPEG: avoid use of uninitialized memory on corrupted files,
- TIFFFetchDirectory(): fix invalid cast from uint64 to tmsize_t,
- allocChoppedUpStripArrays(): avoid unsigned integer overflow,
- tif_ojpeg: avoid use of uninitialized memory on edge/broken file,
- ByteCountLooksBad and EstimateStripByteCounts: avoid unsigned integer
overflows.
-- Laszlo Boszormenyi (GCS) <email address hidden> Tue, 17 Sep 2019 22:07:35 +0000
-
tiff (4.0.10+git190818-1) unstable; urgency=high
* Git snapshot, fixing the following security issues:
- RGBA interface: fix integer overflow potentially causing write heap
buffer overflow,
- setByteArray(): avoid potential signed integer overflow.
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 18 Aug 2019 11:25:27 +0000
-
tiff (4.0.10+git190814-1) unstable; urgency=high
* Git snapshot, fixing the following security issues:
- TryChopUpUncompressedBigTiff(): avoid potential division by zero,
- fix vulnerability introduced by defer strile loading,
- fix vulnerability in 'D' (DeferStrileLoad) mode,
- return infinite distance when denominator is zero,
- OJPEG: avoid use of uninitialized memory on corrupted files,
- OJPEG: fix integer division by zero on corrupted subsampling factors,
- OJPEGReadBufferFill(): avoid very long processing time on corrupted
files,
- TIFFClientOpen(): fix memory leak if one of the required callbacks is
not provided,
- CVE-2019-14973, fix integer overflow in _TIFFCheckMalloc() and other
implementation-defined behaviour (closes: #934780).
* Update libtiff5 symbols.
* Update Standards-Version to 4.4.0 .
-- Laszlo Boszormenyi (GCS) <email address hidden> Wed, 14 Aug 2019 19:24:22 +0000
-
tiff (4.0.10-4) unstable; urgency=high
* Backport security fixes:
- CVE-2018-12900: heap-based buffer overflow in
cpSeparateBufToContigBuf() cause remote DoS (closes: #902718),
- CVE-2018-17000: NULL pointer dereference in _TIFFmemcmp() cause DoS
(closes: #908778),
- CVE-2018-19210: NULL pointer dereference in TIFFWriteDirectorySec()
cause DoS (closes: #913675),
- CVE-2019-6128: TIFFFdOpen() memory leak (closes: #921157).
* Update watch file.
* Update Standards-Version to 4.3.0 .
-- Laszlo Boszormenyi (GCS) <email address hidden> Sat, 02 Feb 2019 18:34:29 +0000
-
tiff (4.0.10-3) unstable; urgency=medium
* Backport fix for lossless WebP compression config.
-- Laszlo Boszormenyi (GCS) <email address hidden> Thu, 22 Nov 2018 17:01:04 +0000
-
tiff (4.0.10-2) unstable; urgency=medium
* Add libegl1-mesa-dev as build dependency until mesa-common-dev is fixed.
-- Laszlo Boszormenyi (GCS) <email address hidden> Tue, 20 Nov 2018 00:24:26 +0000
-
tiff (4.0.10-1) unstable; urgency=high
* New upstream release.
* Fix CVE-2018-18661: NULL pointer dereference in LZWDecode()
(closes: #912012).
* Move libtiff5-dev contents to libtiff-dev .
* Mark libtiff-dev as Multi-Arch same (closes: #884978).
* Mark libtiff-{tools,opengl} as Multi-Arch foreign (closes: #904165).
* Mark libtiff-doc as Multi-Arch foreign (closes: #907794).
* Fix TIFFReadRawStrip man page typo (closes: #672858).
* Update Standards-Version to 4.2.1 .
-- Laszlo Boszormenyi (GCS) <email address hidden> Mon, 19 Nov 2018 17:16:05 +0000
-
tiff (4.0.9+git181026-1) unstable; urgency=high
* Git snapshot, fixing the following security issues:
- CVE-2018-17100, int32 overflow in multiply_ms() which can cause a DoS
or possibly have unspecified other impact via a crafted image file
(closes: #909038),
- CVE-2018-17101, two out-of-bounds writes in cpTags() which can cause a
DoS or possibly have unspecified other impact via a crafted image file
(closes: #909037),
- CVE-2018-18557, out-of-bounds write in JBIGDecode() (closes: #911635).
* Remove previously backported security patches.
* Build with Zstandard, a fast lossless compression algorithm.
* Build with WebP, the modern VP8 compression format.
* Update libtiff5 symbols.
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 28 Oct 2018 11:04:14 +0000
-
tiff (4.0.9-6) unstable; urgency=high
* Fix CVE-2018-8905: eap-based buffer overflow in LZWDecodeCompat()
(closes: #893806).
* Fix CVE-2018-10963: remote denial of service (closes: #898348).
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 01 Jul 2018 19:46:23 +0000
-
tiff (4.0.9-5) unstable; urgency=high
* Fix CVE-2017-11613: avoid memory exhaustion in
ChopUpSingleUncompressedStrip() (closes: #869823).
* Fix CVE-2018-7456: NULL pointer dereference in TIFFPrintDirectory()
(closes: #891288).
* Fix CVE-2017-17095: heap-based buffer overflow in pal2rgb tool
(closes: #883320).
* Don't specify parallel to debhelper.
* Update Standards-Version to 4.1.4 .
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 15 Apr 2018 18:13:42 +0000
-
tiff (4.0.9-4) unstable; urgency=high
* Fix CVE-2018-5784: uncontrolled resource consumption in TIFFSetDirectory()
(closes: #890441).
-- Laszlo Boszormenyi (GCS) <email address hidden> Wed, 14 Feb 2018 20:07:21 +0000
-
tiff (4.0.9-3) unstable; urgency=high
* Fix CVE-2017-18013: NULL pointer dereference in TIFFPrintDirectory()
(closes: #885985).
-- Laszlo Boszormenyi (GCS) <email address hidden> Mon, 01 Jan 2018 16:26:47 +0000
-
tiff (4.0.9-2) unstable; urgency=high
* Fix CVE-2017-9935: heap-based buffer overflow in the t2p_write_pdf()
function (closes: #866109).
* Update debhelper level to 11 .
* Update Standards-Version to 4.1.2 .
-- Laszlo Boszormenyi (GCS) <email address hidden> Fri, 15 Dec 2017 17:45:42 +0000
-
tiff (4.0.9-1) unstable; urgency=medium
* New upstream release.
* Remove previously backported security patches.
* Update libtiff5 symbols.
* Make -dev recommend pkg-config (closes: #814417).
* Update debhelper level to 10:
- don't need to specify 'with autotools-dev' anymore,
- remove autotools-dev build dependency,
- remove dh-autoreconf build dependency.
[ Helmut Grohne <email address hidden> ]
* Turn libtiff-dev into a real package (closes: #780807).
-- Laszlo Boszormenyi (GCS) <email address hidden> Sat, 02 Dec 2017 09:24:59 +0000
-
tiff (4.0.8-6) unstable; urgency=high
* Backport security fixes:
- prevent OOM in gtTileContig() ,
- prevent OOM in TIFFFetchStripThing() ,
- CVE-2017-12944, OOM prevention in TIFFReadDirEntryArray()
(closes: #872607),
- avoid floating point division by zero in initCIELabConversion() .
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 29 Oct 2017 13:29:44 +0000
-
tiff (4.0.8-5) unstable; urgency=high
* Backport security fixes:
- CVE-2017-13726, reachable assertion abort in TIFFWriteDirectorySec()
(closes: #873880),
- CVE-2017-13727, reachable assertion abort in
TIFFWriteDirectoryTagSubifd() (closes: #873879).
-- Laszlo Boszormenyi (GCS) <email address hidden> Thu, 31 Aug 2017 21:09:59 +0000
-
tiff (4.0.8-4) unstable; urgency=high
* Fix regression in the decoding of old-style LZW compressed files.
* Fix CVE-2017-11335: heap based buffer write overflow in tiff2pdf
(closes: #868513).
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 16 Jul 2017 11:07:56 +0000
-
tiff (4.0.8-3) unstable; urgency=high
* Backport security fixes:
- CVE-2017-9936, memory leak in error code path of JBIGDecode()
(closes: #866113),
- prevent out of memory in gtTileContig() on corrupted files,
- CVE-2017-10688, assertion failure in TIFFWriteDirectoryTagCheckedXXXX()
(closes: #866611).
* Add required _TIFFReadEncodedStripAndAllocBuffer@LIBTIFF_4.0 symbol to the
libtiff5 package.
* Update Standards-Version to 4.0.0 .
-- Laszlo Boszormenyi (GCS) <email address hidden> Sat, 01 Jul 2017 18:13:15 +0000
-
tiff (4.0.8-2) unstable; urgency=high
* Backport security fixes:
- TIFFYCbCrToRGBInit(): stricter clamping to avoid int32 overflow in
TIFFYCbCrtoRGB(),
- initYCbCrConversion(): stricter validation for refBlackWhite
coefficients values - to avoid invalid float->int32 conversion,
- CVE-2016-10095 and CVE-2017-9147: add _TIFFCheckFieldIsValidForCodec()
and use it in TIFFReadDirectory() (closes: #850316, #863185).
* Add required _TIFFCheckFieldIsValidForCodec@LIBTIFF_4.0 symbol to the
libtiff5 package.
-- Laszlo Boszormenyi (GCS) <email address hidden> Thu, 01 Jun 2017 17:56:08 +0000
-
tiff (4.0.8-1) unstable; urgency=high
* New upstream release of merged security fixes.
* Add required TIFFReadRGBAStripExt@LIBTIFF_4.0 and
TIFFReadRGBATileExt@LIBTIFF_4.0 symbols to the libtiff5 package.
-- Laszlo Boszormenyi (GCS) <email address hidden> Wed, 24 May 2017 19:49:04 +0000
-
tiff (4.0.7-7) unstable; urgency=high
* Backport security fix for CVE-2016-10371 (closes: #862929).
* Backport security fix for CVE-2015-7554 (closes: #809066, #842043).
-- Laszlo Boszormenyi (GCS) <email address hidden> Sat, 20 May 2017 16:35:43 +0000
-
tiff (4.0.7-6) unstable; urgency=high
* Backport security fixes:
- CVE-2017-7595, divide-by-zero in JPEGSetupEncode (closes: #860003),
- CVE-2017-7596, CVE-2017-7597, CVE-2017-7598,CVE-2017-7599 CVE-2017-7600,
CVE-2017-7601 and CVE-2017-7602, multiple UBSAN crashes,
- CVE-2017-7592, left-shift undefined behavior issue in putagreytile
(closes: #859998),
- CVE-2017-7593, unitialized-memory access from tif_rawdata
(closes: #860000),
- CVE-2017-7594, leak in OJPEGReadHeaderInfoSecTablesAcTable
(closes: #860001).
* Add required _TIFFcalloc@LIBTIFF_4.0 symbol to the libtiff5 package.
-- Laszlo Boszormenyi (GCS) <email address hidden> Fri, 14 Apr 2017 07:21:47 +0000
-
tiff (4.0.7-5) unstable; urgency=high
* Fix CVE-2017-5225: heap buffer overflow via a crafted BitsPerSample value
(closes: #851297).
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 15 Jan 2017 16:49:05 +0000
-
tiff (4.0.7-4) unstable; urgency=high
* Fix CVE-2016-10094: heap-based overflow in t2p_readwrite_pdf_image_tile().
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 01 Jan 2017 19:03:49 +0000
-
tiff (4.0.7-3) unstable; urgency=medium
* Backport upstream fix of TIFFFaxTabEnt structure.
-- Laszlo Boszormenyi (GCS) <email address hidden> Tue, 13 Dec 2016 19:02:25 +0000
-
tiff (4.0.7-2) unstable; urgency=high
* Backport security fixes:
- fix uint32 overflow in TIFFReadEncodedStrip() that caused an integer
division by zero,
- avoid uint32 underflow in cpDecodedStrips that can cause various
issues, such as buffer overflows in the library,
- fix heap-based buffer overflow on generation of PixarLog / LUV
compressed files, with ColorMap, TransferFunction attached and nasty
plays with bitspersample,
- fix ChopUpSingleUncompressedStrip() in reading outside of the
StripByCounts/StripOffsets arrays when using TIFFReadScanline()
(closes: #846837),
- make OJPEGDecode() early exit in case of failure in OJPEGPreDecode() to
avoid a divide by zero, and potential other issues,
- fix readContigStripsIntoBuffer() in -i (ignore) mode so that the
output buffer is correctly incremented to avoid write outside bounds,
- add 3 extra bytes at end of strip buffer in
readSeparateStripsIntoBuffer() to avoid read outside of heap allocated
buffer,
- fix integer division by zero when BitsPerSample is missing
(closes: #846838),
- fix null pointer dereference in -r mode when the image has no
StripByteCount tag,
- avoid potential division by zero if BitsPerSamples tag is missing,
- limit the return number of inks to SamplesPerPixel in
TIFFGetField(, TIFFTAG_NUMBEROFINKS, ) , so that code that parses ink
names doesn't go past the end of the buffer,
- avoid another potential division by zero if BitsPerSamples tag is
missing,
- fix uint32 underflow/overflow that can cause heap-based buffer overflow,
- replace assert( (bps % 8) == 0 ) by a non assert check.
* Remove thumbnail and rgb2ycbcr documentations, these tools no longer
present.
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 04 Dec 2016 12:24:44 +0000
-
tiff (4.0.7-1) unstable; urgency=high
* New upstream release.
* Fixes the following vulnerabilities:
- CVE-2015-7313, OOM when parsing crafted tiff files (closes: #800124),
- CVE-2016-3622, denial of service (divide-by-zero error) via
the fpAcc function in tif_predict.c (closes: #820365),
- CVE-2016-3945, multiple integer overflows in the tiff2rgba tool,
- CVE-2016-3990, write buffer overflow in PixarLogEncode,
- CVE-2016-3991 and CVE-2016-5322, heap-based buffer overflow in the
loadImage function,
- CVE-2016-9273, heap-buffer-overflow in cpStrips (closes: #844013),
- CVE-2016-9297, segfault in _TIFFPrintField() (closes: #844226),
- CVE-2016-9448, in TIFFFetchNormalTag(), do not dereference NULL pointer
(regression of CVE-2016-9297),
- heap buffer overflow via writeBufferToSeparateStrips() in tiffcrop.
* Remove backported vulnerability fixes, this release contains those.
* Update libtiff5 symbols.
-- Laszlo Boszormenyi (GCS) <email address hidden> Sat, 19 Nov 2016 18:05:24 +0000
-
tiff (4.0.6-3) unstable; urgency=high
* Fix architecture independent only build (closes: #806118).
* Fix CVE-2015-8668 , CVE-2016-3619 , CVE-2016-3620 (closes: #820363),
CVE-2016-3621 (closes: #820364) and CVE-2016-5319 with removing bmp2tiff
(closes: #820364).
* Fix CVE-2016-3186 and CVE-2016-5102 with removing gif2tiff.
* Fix CVE-2016-3631 (closes: #820366), CVE-2016-3632 , CVE-2016-3633 ,
CVE-2016-3634 and CVE-2016-8331 with removing thumbnail.
* Backport upstream fix for CVE-2016-3623 and CVE-2016-3624 .
* Backport upstream fix for CVE-2016-5652 (closes: #842361).
* Backport upstream fix for CVE-2016-3658 .
* Removed vulnerable, unsupported tools (closes: #827484, #842046).
* Comment out Vcs fields for now.
-- Laszlo Boszormenyi (GCS) <email address hidden> Mon, 31 Oct 2016 15:56:56 +0000
-
tiff (4.0.6-2) unstable; urgency=high
* Backport fix for the following vulnerabilities:
- CVE-2016-5314, PixarLogDecode() heap-based buffer overflow
(closes: #830700),
- CVE-2016-5316, PixarLogCleanup() Segmentation fault,
- CVE-2016-5320, rgb2ycbcr: command excution,
- CVE-2016-5875, heap-based buffer overflow when using the PixarLog
compression format,
- CVE-2016-6223, information leak in libtiff/tif_read.c ,
- CVE-2016-5321, DumpModeDecode(): Ddos,
- CVE-2016-5323, tiffcrop _TIFFFax3fillruns(): NULL pointer dereference.
* Be primary maintainer and keep Ondřej as uploader.
* Update Standards-Version to 3.9.8 .
-- Laszlo Boszormenyi (GCS) <email address hidden> Sat, 16 Jul 2016 11:45:21 +0000
-
tiff (4.0.6-1) unstable; urgency=high
* New upstream release.
* Backport upstream fixes for:
- CVE-2015-8665 an out-of-bound read in TIFFRGBAImage interface,
- CVE-2015-8683 an out-of-bounds read in CIE Lab image format.
* Backport fix for potential out-of-bound writes in decode.
* Backport fix for potential out-of-bound write in NeXTDecode().
-- Laszlo Boszormenyi (GCS) <email address hidden> Thu, 31 Dec 2015 16:22:24 +0100
-
tiff (4.0.5-1) unstable; urgency=medium
* Update László Böszörményi to Laszlo Boszormenyi (GCS)
* Add Vcs URLs to debian/control
* Imported Upstream version 4.0.5
* Remove all patches - they have been merged upstream
* Convert the package to pure debhelper and remove some legacy stuff
-- Ondřej Surý <email address hidden> Tue, 01 Sep 2015 13:10:55 +0200
-
tiff (4.0.3-13) unstable; urgency=medium
* Thanks Jay for maintaining tiff for so long
* Add me as a new maintainer, and add László Böszörményi to Uploaders
* Cleanup debian a bit:
- Run wrap-and-sortize -a)
- Update d/copyright to Copyright Format 1.0
- Remove files related to libtiff4->libtiff5 transition
* Add C++ symbols file for libtiffxx5
-- Ondřej Surý <email address hidden> Tue, 05 May 2015 08:37:59 +0200
-
tiff (4.0.3-12.3) unstable; urgency=medium
* Add another (final) patch for CVE-2014-8128 (Bug #2499). Thanks to
Petr Gajdos
-- Moritz Muehlenhoff <email address hidden> Mon, 23 Mar 2015 18:26:40 +0100
-
tiff (4.0.3-12.2) unstable; urgency=medium
* Add another patch for CVE-2014-8128 (Bug #2501)
-- Moritz Muehlenhoff <email address hidden> Fri, 13 Mar 2015 23:54:02 +0100
-
tiff (4.0.3-12.1) unstable; urgency=medium
* NMU as discussed with Ondrej, the future adopter of tiff
* Fix multiple security issues, exact details will be recorded in the
Debian security tracker
-- Moritz Muehlenhoff <email address hidden> Sat, 21 Feb 2015 13:06:08 +0100
-
tiff (4.0.3-12) unstable; urgency=high
* Fix integer overflow in bmp2tiff. CVE-2014-9330. (Closes: #773987)
-- Jay Berkenbilt <email address hidden> Tue, 30 Dec 2014 11:32:04 -0500
-
tiff (4.0.3-11) unstable; urgency=medium
* Don't crash on JPEG => non-JPEG conversion (Closes: #741451)
* Thanks Tomasz Buchert <email address hidden> for preparing the fix!
-- Jay Berkenbilt <email address hidden> Tue, 23 Dec 2014 15:51:40 -0500
-
tiff (4.0.3-10) unstable; urgency=medium
* Remove libtiff4-dev, completing the tiff transition. Packages that
still declare build dependencies on libtiff4-dev must now build depend
on libtiff-dev instead, or if a versioned dependency is required,
libtiff5-dev with a specific version.
-- Jay Berkenbilt <email address hidden> Sun, 29 Jun 2014 17:32:18 -0400
-
tiff (4.0.3-9) unstable; urgency=medium
* Fix for CVE-2013-4243 (validation for gif2tiff) from Red Hat. (Closes:
#742917)
-- Jay Berkenbilt <email address hidden> Sat, 21 Jun 2014 18:12:40 -0400
-
tiff (4.0.3-8) unstable; urgency=medium
* Remove libtiff5-alt-dev transitional package now that no one is
build-depending on it anymore.
-- Jay Berkenbilt <email address hidden> Sat, 01 Mar 2014 09:36:51 -0500
-
tiff (4.0.3-7) unstable; urgency=medium
* Use dh-autoreconf to support new architectures in Ubuntu.
-- Jay Berkenbilt <email address hidden> Mon, 23 Dec 2013 09:58:47 -0500
-
tiff (4.0.3-6) unstable; urgency=low
* Update standards to 3.9.5. No changes required.
* libtiff4 -> libtiff5 transition. libtiff5-dev now provides
libtiff-dev. libtiff5-alt-dev and libtiff4-dev are transitional
packages that depend on libtiff5-dev. They will both be removed
before jessie.
-- Jay Berkenbilt <email address hidden> Wed, 04 Dec 2013 14:36:36 -0500
-
tiff (4.0.3-5) unstable; urgency=low
* Replace shlibs file with symbols file
* Update standards to 3.9.4
-- Jay Berkenbilt <email address hidden> Sun, 15 Sep 2013 08:31:41 -0400
-
tiff (4.0.3-4) unstable; urgency=low
* Complete Multi-Arch conversion for dev packages. (Closes: #689085)
-- Jay Berkenbilt <email address hidden> Sat, 24 Aug 2013 11:50:20 -0400
-
tiff (4.0.3-3) unstable; urgency=high
* Incorporated fixes to security issues CVE-2013-4244.
-- Jay Berkenbilt <email address hidden> Sat, 24 Aug 2013 11:20:00 -0400
-
tiff (4.0.3-2) unstable; urgency=high
* Incorporated fixes to security issues CVE-2013-4231, CVE-2013-4232.
(Closes: #719303)
-- Jay Berkenbilt <email address hidden> Thu, 22 Aug 2013 11:52:58 -0400
-
tiff (4.0.3-1) unstable; urgency=low
* Acknowledge/incorporate NMU. Thanks!
* New upstream version. Patches incorporated:
CVE-2012-3401.patch
CVE-2012-4447.patch
* Add build dependency on autotools-dev to help porters.
-- Jay Berkenbilt <email address hidden> Sun, 23 Jun 2013 10:39:04 -0400
-
tiff (4.0.2-6+nmu1) unstable; urgency=high
* Non-maintainer upload by the Security Team.
* Fix cve-2013-1960: heap-based buffer overlow in tiff2pdf
(closes: #706675).
* Fix cve-2013-1961: stack-based buffer overflow in tiff2pdf
(closes: #706674).
-- Michael Gilbert <email address hidden> Mon, 17 Jun 2013 01:27:17 +0000
-
tiff (4.0.2-6) unstable; urgency=high
* Fix /usr/share/doc symlink to directory transition. When upgrading
from very old versions (pre 3.8.2-8), /usr/share/doc may contain
symbolic links that should be removed. (Closes: #687645)
-- Jay Berkenbilt <email address hidden> Sat, 26 Jan 2013 12:28:19 -0500
-
tiff (4.0.2-5) unstable; urgency=high
* Add fix for CVE-2012-4564, a heap-buffer overflow. Thanks Adrian La
Duca for doing all the work to prepare this upload. (Closes: #692345)
-- Jay Berkenbilt <email address hidden> Sat, 17 Nov 2012 12:40:25 -0500
-
tiff (4.0.2-4) unstable; urgency=high
* Previous change was uploaded with the wrong CVE number. I updated the
last changelog entry. The correct CVE number is CVE-2012-4447.
-- Jay Berkenbilt <email address hidden> Fri, 05 Oct 2012 17:33:44 -0400
-
tiff (4.0.2-2) unstable; urgency=high
* SECURITY UPDATE: possible arbitrary code execution via heap overflow
in tiff2pdf. (Closes: #682115)
- debian/patches/CVE-2012-3401.patch: properly set t2p->t2p_error in
tools/tiff2pdf.c.
- CVE-2012-3401
Changes prepared by Marc Deslauriers for Ubuntu. Thanks!
-- Jay Berkenbilt <email address hidden> Sat, 21 Jul 2012 21:27:34 -0400
-
tiff (4.0.2-1) unstable; urgency=low
* New upstream release
-- Jay Berkenbilt <email address hidden> Sun, 24 Jun 2012 13:45:42 -0400
-
tiff (4.0.1-8) unstable; urgency=low
* Call glFlush() in tiffgt to fix display problems. From
https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/797166.
-- Jay Berkenbilt <email address hidden> Sat, 16 Jun 2012 21:20:04 -0400
-
tiff (4.0.1-7) unstable; urgency=low
* Add new temporary package libtiff5-alt-dev, which provides libtiff5
development files in a location that doesn't conflict with
libtiff4-dev. See README.Debian for details.
-- Jay Berkenbilt <email address hidden> Thu, 24 May 2012 15:24:36 -0400
-
tiff (4.0.1-6) unstable; urgency=low
* Include pkg-config files
-- Jay Berkenbilt <email address hidden> Sun, 13 May 2012 12:53:38 -0400
-
tiff (4.0.1-5) unstable; urgency=low
* Fix shlibs again.
-- Jay Berkenbilt <email address hidden> Sun, 22 Apr 2012 11:41:44 -0400
-
tiff (4.0.1-3) unstable; urgency=low
* Support JBIG now that patents have expired. (Closes: #667835)
* Support LZMA.
-- Jay Berkenbilt <email address hidden> Sat, 14 Apr 2012 19:03:04 -0400
-
tiff (4.0.1-2) unstable; urgency=high
* Incorporated fix to CVE-2012-1173, a problem in the parsing of the
TileSize entry, which could result in the execution of arbitrary code
if a malformed image is opened.
* Updated standards to 3.9.3
-- Jay Berkenbilt <email address hidden> Fri, 06 Apr 2012 10:10:48 -0400
-
tiff (4.0.1-1) unstable; urgency=low
* New upstream release
* Point watch file to new download location
-- Jay Berkenbilt <email address hidden> Mon, 20 Feb 2012 09:43:54 -0500
-
tiff (3.9.5-2) unstable; urgency=low
* Implemented mulitarch and and PIE build for security hardening by
integrating the changes from the Ubuntu tiff packages. Thanks to Marc
Deslauriers and anyone else who did the actual work.
-- Jay Berkenbilt <email address hidden> Sat, 17 Sep 2011 10:15:39 -0400
-
tiff (3.9.5-1) unstable; urgency=low
* New upstream release. All security patches are fully incorporated into this version, as are many other bug fixes. * Updated standards version to 3.9.2. No changes needed. -- Jay Berkenbilt <email address hidden> Sat, 16 Apr 2011 13:15:51 -0400
-
tiff (3.9.4-9) unstable; urgency=high
* CVE-2011-1167: correct potential buffer overflow with thunder encoded files with wrong bitspersample set. (Closes: #619614) -- Jay Berkenbilt <email address hidden> Sat, 02 Apr 2011 10:59:38 -0400
-
tiff (3.9.4-8) unstable; urgency=low
* Enable PIE (position independent executable) build for security hardening. Patch from Ubuntu. (Closes: #613759) -- Jay Berkenbilt <email address hidden> Sat, 19 Mar 2011 10:22:32 -0400
-
tiff (3.9.4-7) unstable; urgency=high
* Incorporate revised fix to CVE-2011-0192. -- Jay Berkenbilt <email address hidden> Sun, 13 Mar 2011 14:33:38 -0400
-
tiff (3.9.4-6) unstable; urgency=high
* Incorporated fix to CVE-2011-0192, "Buffer overflow in Fax4Decode". -- Jay Berkenbilt <email address hidden> Sat, 26 Feb 2011 18:44:23 -0500
-
tiff (3.9.4-5) unstable; urgency=high
* Incorporated fix to CVE-2010-3087, a potential denial of service
exploitable with a specially crafted TIFF file. (Closes: #600188)
-- Jay Berkenbilt <email address hidden> Sun, 17 Oct 2010 16:44:08 -0400
-
tiff (3.9.4-4) unstable; urgency=high
* Incorporated fix to CVE-2010-2483, "fix crash on OOB reads in
putcontig8bitYCbCr11tile". (Closes: #595064)
-- Jay Berkenbilt <email address hidden> Sat, 02 Oct 2010 13:17:12 -0400
-
tiff (3.9.4-3) unstable; urgency=low
* Updated control file to remove obsolete Conflicts/Replaces for ancient
packages.
* Empty dependency_libs in all .la files as part of the .la file. This
also resolves the problem of having hard-coded paths in the .la file.
(Closes: #509016)
* Updated standards version to 3.9.1.
-- Jay Berkenbilt <email address hidden> Sat, 14 Aug 2010 16:28:49 -0400
-
tiff (3.9.4-2) unstable; urgency=high
* Incorporated patch to fix CVE-2010-2233, which fixes a specific
failure of tif_getimage on 64-bit platforms.
-- Jay Berkenbilt <email address hidden> Fri, 13 Aug 2010 20:16:29 -0400
-
tiff (3.9.4-1) unstable; urgency=low
* New upstream release
-- Jay Berkenbilt <email address hidden> Fri, 18 Jun 2010 21:28:11 -0400
-
tiff (3.9.2-3) unstable; urgency=low
* Depend on libjpeg-dev instead of libjpeg62-dev. (Closes: #569242)
* Change source format to '3.0 (quilt)'
* Update standards version to 3.8.4. No changes required.
-- Jay Berkenbilt <email address hidden> Wed, 10 Feb 2010 19:20:20 -0500
-
tiff (3.9.2-2) unstable; urgency=low
* Include patch from upstream to fix problems with TIFFReadScanline()
and ycbcr-encoded JPEG images. (Closes: #510792)
* Fix some manual page spelling errors found by lintian.
-- Jay Berkenbilt <email address hidden> Sun, 10 Jan 2010 10:56:32 -0500
-
tiff (3.9.2-1) unstable; urgency=low
* New upstream release
-- Jay Berkenbilt <email address hidden> Fri, 06 Nov 2009 22:52:06 -0500
-
tiff (3.9.1-1) unstable; urgency=low
* New upstream release
-- Jay Berkenbilt <email address hidden> Fri, 28 Aug 2009 15:44:23 -0400
-
tiff (3.8.2-13) unstable; urgency=high
* Apply patches to fix CVE-2009-2347, which covers two integer overflow
conditions.
* LZW patch from last update addressed CVE-2009-2285. Renamed the patch
to make this clearer.
-- Jay Berkenbilt <email address hidden> Sun, 12 Jul 2009 18:03:33 -0400
-
tiff (3.8.2-11) unstable; urgency=high
* Apply security patches (CVE-2008-2327)
* Convert patch system to quilt
* Create README.source
* Set standards version to 3.8.0
-- Jay Berkenbilt <email address hidden> Sun, 17 Aug 2008 13:16:37 -0400