aboutsummaryrefslogtreecommitdiffstats
path: root/main/tiff
Commit message (Collapse)AuthorAgeFilesLines
* main/tiff: fix CVE-2018-8905prspkt2018-05-242-2/+57
|
* main/tiff: fix CVE-2018-7456prspkt2018-05-242-2/+176
|
* main/tiff: fix CVE-2018-5784prspkt2018-04-023-3/+135
| | | | fixes #8710
* main/tiff: security fix CVE-2017-18013Leonardo Arena2018-02-082-4/+44
| | | | Fixes #8464
* main/tiff: security upgrade to 4.0.9 (CVE-2017-16231,CVE-2017-16232)Natanael Copa2017-11-2314-861/+7
| | | | fixes #8148
* main/tiff: security upgrade to 4.0.8. Fixes #7484Francesco Colista2017-08-073-25/+143
|
* main/tiff: fix secfix commentNatanael Copa2017-05-191-8/+8
| | | | may not have tabs
* main/tiff: security fixes #7120Leonardo Arena2017-04-2611-6/+684
| | | | | | | CVE-2017-7592, CVE-2017-7593, CVE-2017-7594, CVE-2017-7595, CVE-2017-7596, CVE-2017-7598, CVE-2017-7601, CVE-2017-7602 CVE-2017-7597, CVE-2017-7599, CVE-2017-7600 are already included in upstream release
* main/tiff: security fixes #6735Sergey Lukin2017-01-272-5/+81
| | | | CVE-2017-5225: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value
* main/tiff: security upgrade to 4.0.7 - fixes #6665Sergey Lukin2017-01-1310-727/+31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes: CVE-2016-9273: heap-buffer-overflow in cpStrips CVE-2016-9297: segfault in _TIFFPrintField CVE-2016-9448: Invalid read of size 1 in TIFFFetchNormalTag CVE-2016-9453: out-of-bounds Write Caused by memcpy and no bound check in tiff2pdf CVE-2016-3186: Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file. CVE-2016-3621: Out-of-bounds Read in the bmp2tiff tool CVE-2016-3622: Divide By Zero in the tiff2rgba tool CVE-2016-3623, CVE-2016-3624: Divide By Zero in the rgb2ycbcr tool CVE-2016-3625: Out-of-bounds Read in the tiff2bw tool CVE-2016-3658, CVE-2014-8127: Illegal read in TIFFWriteDirectoryTagLongLong8Array function in tiffset / tif_dirwrite.c CVE-2016-5314, CVE-2016-5315, CVE-2016-5316, CVE-2016-5317: PixarLogDecode() out-of-bound writes CVE-2016-5320, CVE-2016-5875: Out-of-bounds write in PixarLogDecode() function in tif_pixarlog.c bugzilla suppose that CVE-2016-5320 is a duplicate of CVE-2016-5314 (https://bugs.alpinelinux.org/issues/6661) which was fixed in tiff 4.0.7 (http://bugzilla.maptools.org/show_bug.cgi?id=2554#c1) CVE-2016-5321: out-of-bounds read in tiffcrop / DumpModeDecode() function CVE-2016-5323: Divide-by-zero in _TIFFFax3fillruns() function CVE-2016-5652: tiff2pdf JPEG Compression Tables Heap Buffer Overflow TODO: CVE-2016-5318: Memory corruption in _TIFFVGetField (thumbnail) remains unfixed still (http://bugzilla.maptools.org/show_bug.cgi?id=2561) because of that #6661 could not be marked as fixed Comments: 4.0.7 contains lots of fixes: http://libtiff.maptools.org/v4.0.7.html https://fossies.org/diffs/tiff/4.0.6_vs_4.0.7/ChangeLog-diff.html There is only one major change mentioned: The libtiff tools bmp2tiff, gif2tiff, ras2tiff, sgi2tiff, sgisv, and ycbcr are completely removed from the distribution. These tools were written in the late 1980s and early 1990s for test and demonstration purposes. In some cases the tools were never updated to support updates to the file format, or the file formats are now rarely used. In all cases these tools increased the libtiff security and maintenance exposure beyond the value offered by the tool. http://libtiff.maptools.org/v4.0.7.html Patches: CVE-2015-7554.patch, CVE-2015-8665.patch, CVE-2015-8668.patch, CVE-2015-8781-8782-8783.patch, CVE-2015-8784.patch, CVE-2016-3632.patch, CVE-2016-3945.patch, CVE-2016-3990.patch, CVE-2016-3991.patch are not needed anymore, because these issues were fixed in 4.0.7
* main/tiff: security fixes #6010Sergey Lukin2016-12-267-9/+384
| | | | | CVE-2015-7554, CVE-2015-8668, CVE-2016-3945, CVE-2016-3632, CVE-2016-3990, CVE-2016-3991
* main/tiff: security fixes. Fixes #5824Leonardo Arena2016-07-044-5/+351
| | | | | | | | | | CVE-2015-8665 CVE-2015-8683 CVE-2015-8781 CVE-2015-8782 CVE-2015-8784 (cherry picked from commit 7f2845dc97725af0dc4230433d9cb42a76c552db)
* rebuild to properly set maintainerCarlo Landmeter2015-09-161-1/+1
|
* main/tiff: upgrade to 4.0.6Eivind Uggedal2015-09-169-1154/+6
|
* Do not delete *.la files manuallyBartłomiej Piotrowski2015-09-101-1/+0
| | | | | Since abuild v2.22.0, these are removed automatically unless 'libtool' option has been specified.
* main/tiff: security fix es for CVE-2013-4243 and CVE-2013-4244Natanael Copa2014-06-243-4/+68
| | | | ref #3081
* main/tiff: fix CVE-2013-4231, CVE-2013-4232Natanael Copa2013-11-063-5/+42
|
* main/[various]: fix build against musl (add update_config_sub)Timo Teräs2013-09-271-1/+1
|
* main/tiff: sec fixes from upstream ↵Natanael Copa2013-08-075-2/+1050
| | | | | | | (CVE-2012-4447,CVE-2012-4564,CVE-2013-1960,CVE-2013-1961) ref #2203 fixes #2204
* [all autotools packages]: normalize ./configureTimo Teräs2013-07-301-2/+6
|
* main/tiff: security upgrade to 4.0.3 (CVE-2012-4447,CVE-2012-4564)Natanael Copa2012-12-072-17/+4
| | | | fixes #1501
* main/tiff: fix checksum for previous commitNatanael Copa2012-08-151-1/+2
|
* main/tiff: add missing patchNatanael Copa2012-08-151-0/+11
|
* main/tiff: actually fix CVE-2012-3401Natanael Copa2012-08-151-1/+2
| | | | fixes #1325
* main/tiff: security upgrade to 4.0.2 (CVE-2012-3401)Natanael Copa2012-08-151-2/+2
| | | | fixes #1325
* main/tiff: upgrade to 4.0.1Natanael Copa2012-07-231-10/+3
| | | | fixes #1245
* APKBUILDs email updateLeonardo Arena2011-11-221-1/+1
|
* main/tiff: rebuildNatanael Copa2011-10-311-1/+1
|
* main/tiff: upgrade to 3.9.5Natanael Copa2011-04-239-1061/+38
| | | | and clean up the APKBUILD
* main: mass-rebuild of packages missing arch in .PKGINFONatanael Copa2011-03-311-1/+1
| | | | this is needed for apk-tools-2.1 migration
* Set all packages with arch="x86 x86_64" to arch="all".William Pitcock2011-01-131-1/+1
|
* main/*: add archNatanael Copa2010-12-131-0/+1
|
* main/tiff: jpeg fixesLeonardo Arena2010-06-082-3/+37
|
* main/[various]: bump pkgrel to force rebuild against nptlNatanael Copa2010-05-041-1/+1
|
* main/tiff: security patchesNatanael Copa2009-08-208-4/+1026
|
* moved extra/* to main/Natanael Copa2009-07-241-0/+26
and fixed misc build issues