aboutsummaryrefslogtreecommitdiffstats
path: root/main/tiff
Commit message (Collapse)AuthorAgeFilesLines
* main/tiff: fix secfixes identCarlo Landmeter2020-02-211-8/+8
|
* main/tiff: security fixes #7122Leonardo Arena2017-04-2611-6/+684
| | | | | | | CVE-2017-7592, CVE-2017-7593, CVE-2017-7594, CVE-2017-7595, CVE-2017-7596, CVE-2017-7598, CVE-2017-7601, CVE-2017-7602 CVE-2017-7597, CVE-2017-7599, CVE-2017-7600 are already included in upstream release
* main/tiff: security fixes #6737Sergey Lukin2017-01-272-5/+81
| | | | CVE-2017-5225: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value
* main/tiff: security upgrade to 4.0.7 - fixes #6667Sergey Lukin2017-01-2010-727/+31
| | | | | | | | | | | | | | | | | | | CVE-2016-9273: heap-buffer-overflow in cpStrips CVE-2016-9297: segfault in _TIFFPrintField CVE-2016-9448: Invalid read of size 1 in TIFFFetchNormalTag CVE-2016-9453: out-of-bounds Write Caused by memcpy and no bound check in tiff2pdf CVE-2016-3186: Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file. CVE-2016-3621: Out-of-bounds Read in the bmp2tiff tool CVE-2016-3622: Divide By Zero in the tiff2rgba tool CVE-2016-3623, CVE-2016-3624: Divide By Zero in the rgb2ycbcr tool CVE-2016-3625: Out-of-bounds Read in the tiff2bw tool CVE-2016-3658, CVE-2014-8127: Illegal read in TIFFWriteDirectoryTagLongLong8Array function in tiffset / tif_dirwrite.c CVE-2016-5314, CVE-2016-5315, CVE-2016-5316, CVE-2016-5317: PixarLogDecode() out-of-bound writes CVE-2016-5320, CVE-2016-5875: Out-of-bounds write in PixarLogDecode() function in tif_pixarlog.c bugzilla suppose that CVE-2016-5320 is a duplicate of CVE-2016-5314 (https://bugs.alpinelinux.org/issues/6661) which was fixed in tiff 4.0.7 (http://bugzilla.maptools.org/show_bug.cgi?id=2554#c1) CVE-2016-5321: out-of-bounds read in tiffcrop / DumpModeDecode() function CVE-2016-5323: Divide-by-zero in _TIFFFax3fillruns() function CVE-2016-5652: tiff2pdf JPEG Compression Tables Heap Buffer Overflow
* main/tiff: security fixes #6012Sergey Lukin2016-12-267-9/+384
| | | | | CVE-2015-7554, CVE-2015-8668, CVE-2016-3945, CVE-2016-3632, CVE-2016-3990, CVE-2016-3991
* main/tiff: remove unneeded patchesLeonardo Arena2016-07-048-1115/+0
|
* main/tiff: security fixes. Fixes #5826Leonardo Arena2016-07-044-4/+349
| | | | | | | | | | | CVE-2015-8665 CVE-2015-8683 CVE-2015-8781 CVE-2015-8782 CVE-2015-8784 (cherry picked from commit 7f2845dc97725af0dc4230433d9cb42a76c552db) (cherry picked from commit df6ff3e3449ac74fc39165229f9764d968aa58f4)
* main/tiff: upgrade to 4.0.6Leonardo Arena2016-07-041-37/+5
|
* main/tiff: security fix es for CVE-2013-4243 and CVE-2013-4244Natanael Copa2014-06-243-4/+68
| | | | ref #3081
* main/tiff: fix CVE-2013-4231, CVE-2013-4232Natanael Copa2013-11-063-5/+42
|
* main/[various]: fix build against musl (add update_config_sub)Timo Teräs2013-09-271-1/+1
|
* main/tiff: sec fixes from upstream ↵Natanael Copa2013-08-075-2/+1050
| | | | | | | (CVE-2012-4447,CVE-2012-4564,CVE-2013-1960,CVE-2013-1961) ref #2203 fixes #2204
* [all autotools packages]: normalize ./configureTimo Teräs2013-07-301-2/+6
|
* main/tiff: security upgrade to 4.0.3 (CVE-2012-4447,CVE-2012-4564)Natanael Copa2012-12-072-17/+4
| | | | fixes #1501
* main/tiff: fix checksum for previous commitNatanael Copa2012-08-151-1/+2
|
* main/tiff: add missing patchNatanael Copa2012-08-151-0/+11
|
* main/tiff: actually fix CVE-2012-3401Natanael Copa2012-08-151-1/+2
| | | | fixes #1325
* main/tiff: security upgrade to 4.0.2 (CVE-2012-3401)Natanael Copa2012-08-151-2/+2
| | | | fixes #1325
* main/tiff: upgrade to 4.0.1Natanael Copa2012-07-231-10/+3
| | | | fixes #1245
* APKBUILDs email updateLeonardo Arena2011-11-221-1/+1
|
* main/tiff: rebuildNatanael Copa2011-10-311-1/+1
|
* main/tiff: upgrade to 3.9.5Natanael Copa2011-04-239-1061/+38
| | | | and clean up the APKBUILD
* main: mass-rebuild of packages missing arch in .PKGINFONatanael Copa2011-03-311-1/+1
| | | | this is needed for apk-tools-2.1 migration
* Set all packages with arch="x86 x86_64" to arch="all".William Pitcock2011-01-131-1/+1
|
* main/*: add archNatanael Copa2010-12-131-0/+1
|
* main/tiff: jpeg fixesLeonardo Arena2010-06-082-3/+37
|
* main/[various]: bump pkgrel to force rebuild against nptlNatanael Copa2010-05-041-1/+1
|
* main/tiff: security patchesNatanael Copa2009-08-208-4/+1026
|
* moved extra/* to main/Natanael Copa2009-07-241-0/+26
and fixed misc build issues