-
tiff (3.7.4-1ubuntu3.11) dapper-security; urgency=low
* SECURITY UPDATE: arbitrary code execution via crafted
THUNDER_2BITDELTAS data
- debian/patches/z_CVE-2011-1167.patch: validate bitspersample and
make sure npixels is sane in libtiff/tif_thunder.c.
- CVE-2011-1167
-- Marc Deslauriers <email address hidden> Wed, 30 Mar 2011 13:34:17 -0400
-
tiff (3.7.4-1ubuntu3.10) dapper-security; urgency=low
* debian/patches/CVE-2011-0192.patch: update for regression in
processing of certain CCITTFAX4 files (LP: #731540).
- http://bugzilla.maptools.org/show_bug.cgi?id=2297
-- Kees Cook <email address hidden> Mon, 14 Mar 2011 10:56:27 -0700
-
tiff (3.7.4-1ubuntu3.9) dapper-security; urgency=low
* SECURITY UPDATE: denial of service via invalid ReferenceBlackWhite
values
- debian/patches/z_CVE-2010-2595.patch: validate values in
libtiff/tif_color.c.
- CVE-2010-2595
* SECURITY UPDATE: denial of service via devide-by-zero (LP: #593067)
- debian/patches/z_CVE-2010-2597.patch: properly initialize fields in
libtiff/tif_strip.c.
- CVE-2010-2597
- CVE-2010-2598
* SECURITY UPDATE: denial of service via out-of-order tags
- debian/patches/z_CVE-2010-2630.patch: correctly handle order in
libtiff/tif_dirread.c.
- CVE-2010-2630
* SECURITY UPDATE: denial of service and possible code exection via
YCBCRSUBSAMPLING tag
- debian/patches/z_CVE-2011-0191.patch: validate td_ycbcrsubsampling in
libtiff/tif_dir.c.
- CVE-2011-0191
* SECURITY UPDATE: denial of service and possible code execution via
buffer overflow in Fax4Decode
- debian/patches/z_CVE-2011-0192.patch: check length in
libtiff/tif_fax3.h.
- CVE-2011-0192
-- Marc Deslauriers <email address hidden> Fri, 04 Mar 2011 10:09:48 -0500
-
tiff (3.7.4-1ubuntu3.8) dapper-security; urgency=low
* SECURITY UPDATE: arbitrary code execution and crashes via multiple
integer overflows. Backported upstream fixes:
- debian/patches/CVE-2010-1411.patch
- debian/patches/fix-unknown-tags.patch
-- Kees Cook <email address hidden> Thu, 17 Jun 2010 12:08:10 -0700
-
tiff (3.7.4-1ubuntu3.6) dapper-security; urgency=low
* SECURITY UPDATE: arbitrary code execution via integer overflows in
tiff2rgba and rgb2ycbcr
- debian/patches/CVE-2009-2347.patch: check for integer overflows in
tools/rgb2ycbcr.c and tools/tiff2rgba.c.
- CVE-2009-2347
-- Marc Deslauriers <email address hidden> Mon, 13 Jul 2009 09:31:11 -0400
-
tiff (3.7.4-1ubuntu3.4) dapper-security; urgency=low
* SECURITY UPDATE: denial of service via buffer underflow in the
LZWDecodeCompat function (LP: #380149)
- debian/patches/CVE-2009-2285.patch: abort if code is bigger than
CODE_CLEAR in libtiff/tif_lzw.c.
- CVE-2009-2285
-- Marc Deslauriers <email address hidden> Fri, 03 Jul 2009 15:19:54 -0400
-
tiff (3.7.4-1ubuntu3.3) dapper-security; urgency=low
* SECURITY UPDATE: arbitrary code execution via LZW overflow.
* Add debian/patches/CVE-2008-2327.patch: thanks to Jay Berkenbilt.
-- Kees Cook <email address hidden> Fri, 29 Aug 2008 11:59:21 -0700
-
tiff (3.7.4-1ubuntu3.2) dapper-security; urgency=low
* SECURITY UPDATE: Arbitrary code execution with crafted TIFF files, found
by Tavis Ormandy of the Google Security Team.
* Add debian/patches/CVE-2006-3459-3465.patch:
- CVE-2006-3459: a stack buffer overflow via TIFFFetchShortPair() in
tif_dirread.c
- CVE-2006-3460: A heap overflow vulnerability was discovered in the
jpeg decoder
- CVE-2006-3461: A heap overflow exists in the PixarLog decoder
- CVE-2006-3462: The NeXT RLE decoder was also vulnerable to a heap
overflow
- CVE-2006-3463: An infinite loop was discovered in
EstimateStripByteCounts()
- CVE-2006-3464: Multiple unchecked arithmetic operations were
uncovered, including a number of the range checking operations
deisgned to ensure the offsets specified in tiff directories are
legitimate.
- A number of codepaths were uncovered where assertions did not hold
true, resulting in the client application calling abort()
- CVE-2006-3465: A flaw was also uncovered in libtiffs custom tag
support
-- Martin Pitt <email address hidden> Wed, 2 Aug 2006 13:27:14 +0200
-
tiff (3.7.4-1ubuntu3.1) dapper-security; urgency=low
* SECURITY UPDATE: Arbitrary command execution with crafted long file names.
* Add debian/patches/tiffsplit-fname-overflow.patch:
- tools/tiffsplit.c: Use snprintf instead of strcpy for copying the
user-specified file name into a statically sized buffer.
- CVE-2006-2656
* Add debian/patches/tiff2pdf-octal-printf.patch:
- tools/tiff2pdf.c: Fix buffer overflow due to wrong printf for octal
signed char (it printed a signed integer, which overflew the buffer and
was wrong anyway).
-- Martin Pitt <email address hidden> Fri, 2 Jun 2006 18:15:30 +0200
-
tiff (3.7.4-1ubuntu3) dapper; urgency=low
* debian/patches/fix_43286_crasher.patch:
- upstream change, fix a crasher (Ubuntu: #43286)
-- Sebastien Bacher <email address hidden> Sun, 7 May 2006 13:21:05 +0200
-
tiff (3.7.4-1ubuntu2) dapper; urgency=low
* SECURITY UPDATE: DoS and arbitrary code execution with crafted TIFF files.
* Add debian/patches/3.8.1-security-fixes.patch: Backported security
relevant fixes from stable 3.8.1 release:
- libtiff/tif_dirread.c: Fix error reporting in TIFFFetchAnyArray()
(%d in format string without corresponding integer argument).
[CVE-2006-2024]
- libtiff/{tif_pixarlog.c, tif_fax3.c, tif_zip.c}: Properly
restore setfield/getfield methods in cleanup functions to avoid crash on
invalid files. [CVE-2006-2024]
- libtiff/{tif_predict.c, tif_predict.h}: Added new function
TIFFPredictorCleanup() to restore parent decode/encode/field methods.
[CVE-2006-2024]
- libtiff/tif_dirread.c: Check for integer overflow in TIFFFetchData().
[CVE-2006-2025]
- libtiff/tif_jpeg.c: Properly restore setfield/getfield methods in
cleanup functions to avoid double free(). [CVE-2006-2026]
- libtiff/tif_color.c: Check for out-of-bounds values in TIFFXYZToRGB().
[CVE-2006-2120]
* See http://bugzilla.remotesensing.org/show_bug.cgi?id=1102 for reproducer
images.
-- Martin Pitt <email address hidden> Wed, 3 May 2006 12:56:50 +0200
-
tiff (3.7.4-1ubuntu1) dapper; urgency=low
* Synchronize to Debian.
* Only change left: xlibmesa-gl-dev -> libgl1-mesa-dev build dependency
change.
-- Martin Pitt <email address hidden> Wed, 9 Nov 2005 18:21:15 -0500