html/v4.0.8.html: Add description of changes targeting the 4.0.8 release.
This commit is contained in:
parent
1a690c0e10
commit
c714d5b5a7
@ -1,3 +1,8 @@
|
|||||||
|
2017-05-21 Bob Friesenhahn <bfriesen@simple.dallas.tx.us>
|
||||||
|
|
||||||
|
* html/v4.0.8.html: Add description of changes targeting the 4.0.8
|
||||||
|
release.
|
||||||
|
|
||||||
2017-05-20 Even Rouault <even.rouault at spatialys.com>
|
2017-05-20 Even Rouault <even.rouault at spatialys.com>
|
||||||
|
|
||||||
* libtiff/tif_getimage.c: initYCbCrConversion(): stricter validation for
|
* libtiff/tif_getimage.c: initYCbCrConversion(): stricter validation for
|
||||||
|
@ -84,7 +84,8 @@ docfiles = \
|
|||||||
v4.0.4.html \
|
v4.0.4.html \
|
||||||
v4.0.5.html \
|
v4.0.5.html \
|
||||||
v4.0.6.html \
|
v4.0.6.html \
|
||||||
v4.0.7.html
|
v4.0.7.html \
|
||||||
|
v4.0.8.html
|
||||||
|
|
||||||
dist_doc_DATA = $(docfiles)
|
dist_doc_DATA = $(docfiles)
|
||||||
|
|
||||||
|
@ -447,7 +447,8 @@ docfiles = \
|
|||||||
v4.0.4.html \
|
v4.0.4.html \
|
||||||
v4.0.5.html \
|
v4.0.5.html \
|
||||||
v4.0.6.html \
|
v4.0.6.html \
|
||||||
v4.0.7.html
|
v4.0.7.html \
|
||||||
|
v4.0.8.html
|
||||||
|
|
||||||
dist_doc_DATA = $(docfiles)
|
dist_doc_DATA = $(docfiles)
|
||||||
SUBDIRS = images man
|
SUBDIRS = images man
|
||||||
|
@ -383,8 +383,6 @@ docfiles = \
|
|||||||
pal2rgb.1.html \
|
pal2rgb.1.html \
|
||||||
ppm2tiff.1.html \
|
ppm2tiff.1.html \
|
||||||
raw2tiff.1.html \
|
raw2tiff.1.html \
|
||||||
rgb2ycbcr.1.html \
|
|
||||||
thumbnail.1.html \
|
|
||||||
tiff2bw.1.html \
|
tiff2bw.1.html \
|
||||||
tiff2pdf.1.html \
|
tiff2pdf.1.html \
|
||||||
tiff2ps.1.html \
|
tiff2ps.1.html \
|
||||||
|
445
html/v4.0.8.html
Normal file
445
html/v4.0.8.html
Normal file
@ -0,0 +1,445 @@
|
|||||||
|
<HTML>
|
||||||
|
<HEAD>
|
||||||
|
<TITLE>
|
||||||
|
Changes in TIFF v4.0.8
|
||||||
|
</TITLE>
|
||||||
|
</HEAD>
|
||||||
|
|
||||||
|
<BODY BGCOLOR=white>
|
||||||
|
<FONT FACE="Helvetica, Arial, Sans">
|
||||||
|
|
||||||
|
<BASEFONT SIZE=4>
|
||||||
|
<B><FONT SIZE=+3>T</FONT>IFF <FONT SIZE=+2>C</FONT>HANGE <FONT SIZE=+2>I</FONT>NFORMATION</B>
|
||||||
|
<BASEFONT SIZE=3>
|
||||||
|
|
||||||
|
<UL>
|
||||||
|
<HR SIZE=4 WIDTH=65% ALIGN=left>
|
||||||
|
<B>Current Version</B>: v4.0.8<BR>
|
||||||
|
<B>Previous Version</B>: <A HREF=v4.0.7.html>v4.0.7</a><BR>
|
||||||
|
<B>Master FTP Site</B>: <A HREF="ftp://download.osgeo.org/libtiff">
|
||||||
|
download.osgeo.org</a>, directory pub/libtiff</A><BR>
|
||||||
|
<B>Master HTTP Site #1</B>: <A HREF="http://www.simplesystems.org/libtiff/">
|
||||||
|
http://www.simplesystems.org/libtiff/</a><BR>
|
||||||
|
<B>Master HTTP Site #2</B>: <A HREF="http://libtiff.maptools.org/">
|
||||||
|
http://libtiff.maptools.org/</a>
|
||||||
|
<HR SIZE=4 WIDTH=65% ALIGN=left>
|
||||||
|
</UL>
|
||||||
|
|
||||||
|
<P>
|
||||||
|
This document describes the changes made to the software between the
|
||||||
|
<I>previous</I> and <I>current</I> versions (see above). If you don't
|
||||||
|
find something listed here, then it was not done in this timeframe, or
|
||||||
|
it was not considered important enough to be mentioned. The following
|
||||||
|
information is located here:
|
||||||
|
<UL>
|
||||||
|
<LI><A HREF="#highlights">Major Changes</A>
|
||||||
|
<LI><A HREF="#configure">Changes in the software configuration</A>
|
||||||
|
<LI><A HREF="#libtiff">Changes in libtiff</A>
|
||||||
|
<LI><A HREF="#tools">Changes in the tools</A>
|
||||||
|
<LI><A HREF="#contrib">Changes in the contrib area</A>
|
||||||
|
</UL>
|
||||||
|
<p>
|
||||||
|
<P><HR WIDTH=65% ALIGN=left>
|
||||||
|
|
||||||
|
<!--------------------------------------------------------------------------->
|
||||||
|
|
||||||
|
<A NAME="highlights"><B><FONT SIZE=+3>M</FONT>AJOR CHANGES:</B></A>
|
||||||
|
|
||||||
|
<UL>
|
||||||
|
|
||||||
|
<LI> None
|
||||||
|
|
||||||
|
</UL>
|
||||||
|
|
||||||
|
|
||||||
|
<P><HR WIDTH=65% ALIGN=left>
|
||||||
|
<!--------------------------------------------------------------------------->
|
||||||
|
|
||||||
|
<A NAME="configure"><B><FONT SIZE=+3>C</FONT>HANGES IN THE SOFTWARE CONFIGURATION:</B></A>
|
||||||
|
|
||||||
|
<UL>
|
||||||
|
|
||||||
|
<LI> None
|
||||||
|
|
||||||
|
</UL>
|
||||||
|
|
||||||
|
<P><HR WIDTH=65% ALIGN=left>
|
||||||
|
|
||||||
|
<!--------------------------------------------------------------------------->
|
||||||
|
|
||||||
|
<A NAME="libtiff"><B><FONT SIZE=+3>C</FONT>HANGES IN LIBTIFF:</B></A>
|
||||||
|
|
||||||
|
<UL>
|
||||||
|
|
||||||
|
<LI> libtiff/tif_getimage.c, libtiff/tif_open.c: add parenthesis
|
||||||
|
to fix cppcheck clarifyCalculation warnings *
|
||||||
|
libtiff/tif_predict.c, libtiff/tif_print.c: fix printf
|
||||||
|
unsigned vs signed formatting (cppcheck
|
||||||
|
invalidPrintfArgType_uint warnings)
|
||||||
|
|
||||||
|
<LI> libtiff/tif_read.c, libtiff/tiffiop.h: fix uint32 overflow in
|
||||||
|
TIFFReadEncodedStrip() that caused an integer division by
|
||||||
|
zero. Reported by Agostino Sarubbo. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2596
|
||||||
|
|
||||||
|
<LI> libtiff/tif_pixarlog.c, libtiff/tif_luv.c: fix heap-based
|
||||||
|
buffer overflow on generation of PixarLog / LUV compressed
|
||||||
|
files, with ColorMap, TransferFunction attached and nasty
|
||||||
|
plays with bitspersample. The fix for LUV has not been
|
||||||
|
tested, but suffers from the same kind of issue of PixarLog.
|
||||||
|
Reported by Agostino Sarubbo. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2604
|
||||||
|
|
||||||
|
<LI> libtiff/tif_strip.c: revert the change in
|
||||||
|
TIFFNumberOfStrips() done for
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2587 /
|
||||||
|
CVE-2016-9273 since the above change is a better fix that
|
||||||
|
makes it unnecessary.
|
||||||
|
|
||||||
|
<LI> libtiff/tif_dirread.c: modify ChopUpSingleUncompressedStrip()
|
||||||
|
to instanciate compute ntrips as
|
||||||
|
TIFFhowmany_32(td->td_imagelength, rowsperstrip), instead of a
|
||||||
|
logic based on the total size of data. Which is faulty is the
|
||||||
|
total size of data is not sufficient to fill the whole image,
|
||||||
|
and thus results in reading outside of the
|
||||||
|
StripByCounts/StripOffsets arrays when using
|
||||||
|
TIFFReadScanline(). Reported by Agostino Sarubbo. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2608.
|
||||||
|
|
||||||
|
<LI> libtiff/tif_ojpeg.c: make OJPEGDecode() early exit in case of
|
||||||
|
failure in OJPEGPreDecode(). This will avoid a divide by zero,
|
||||||
|
and potential other issues. Reported by Agostino Sarubbo.
|
||||||
|
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2611
|
||||||
|
|
||||||
|
<LI> libtiff/tif_write.c: fix misleading indentation as warned by GCC.
|
||||||
|
|
||||||
|
|
||||||
|
<LI> libtiff/tif_fax3.h: revert change done on 2016-01-09 that
|
||||||
|
made Param member of TIFFFaxTabEnt structure a uint16 to
|
||||||
|
reduce size of the binary. It happens that the Hylafax
|
||||||
|
software uses the tables that follow this typedef
|
||||||
|
(TIFFFaxMainTable, TIFFFaxWhiteTable, TIFFFaxBlackTable),
|
||||||
|
although they are not in a public libtiff header. Raised by
|
||||||
|
Lee Howard. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2636
|
||||||
|
|
||||||
|
<LI> libtiff/tiffio.h, libtiff/tif_getimage.c: add
|
||||||
|
TIFFReadRGBAStripExt() and TIFFReadRGBATileExt() variants of
|
||||||
|
the functions without ext, with an extra argument to control
|
||||||
|
the stop_on_error behaviour.
|
||||||
|
|
||||||
|
<LI> libtiff/tif_getimage.c: fix potential memory leaks in error
|
||||||
|
code path of TIFFRGBAImageBegin(). Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2627
|
||||||
|
|
||||||
|
<LI> libtiff/tif_jpeg.c: increase libjpeg max memory usable to 10
|
||||||
|
MB instead of libjpeg 1MB default. This helps when creating
|
||||||
|
files with "big" tile, without using libjpeg temporary files.
|
||||||
|
Related to https://trac.osgeo.org/gdal/ticket/6757
|
||||||
|
|
||||||
|
<LI> libtiff/tif_jpeg.c: avoid integer division by zero in
|
||||||
|
JPEGSetupEncode() when horizontal or vertical sampling is set
|
||||||
|
to 0. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2653
|
||||||
|
|
||||||
|
<LI> libtiff/tif_dirwrite.c: in
|
||||||
|
TIFFWriteDirectoryTagCheckedRational, replace assertion by
|
||||||
|
runtime check to error out if passed value is strictly
|
||||||
|
negative. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2535
|
||||||
|
|
||||||
|
<LI> libtiff/tif_dirread.c: avoid division by floating point 0 in
|
||||||
|
TIFFReadDirEntryCheckedRational() and
|
||||||
|
TIFFReadDirEntryCheckedSrational(), and return 0 in that case
|
||||||
|
(instead of infinity as before presumably) Apparently some
|
||||||
|
sanitizers do not like those divisions by zero. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2644
|
||||||
|
|
||||||
|
<LI> libtiff/tif_dir.c, tif_dirread.c, tif_dirwrite.c: implement
|
||||||
|
various clampings of double to other data types to avoid
|
||||||
|
undefined behaviour if the output range isn't big enough to
|
||||||
|
hold the input value. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2643
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2642
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2646
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2647
|
||||||
|
|
||||||
|
<LI> libtiff/tif_jpeg.c: validate BitsPerSample in
|
||||||
|
JPEGSetupEncode() to avoid undefined behaviour caused by
|
||||||
|
invalid shift exponent. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2648
|
||||||
|
|
||||||
|
<LI> libtiff/tif_read.c: avoid potential undefined behaviour on
|
||||||
|
signed integer addition in TIFFReadRawStrip1() in isMapped()
|
||||||
|
case. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2650
|
||||||
|
|
||||||
|
<LI> libtiff/tif_getimage.c: add explicit uint32 cast in
|
||||||
|
putagreytile to avoid UndefinedBehaviorSanitizer warning.
|
||||||
|
Patch by Nicolás Peña. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2658
|
||||||
|
|
||||||
|
<LI> libtiff/tif_read.c: TIFFReadBufferSetup(): use _TIFFcalloc()
|
||||||
|
to zero initialize tif_rawdata. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2651
|
||||||
|
|
||||||
|
<LI> libtiff/tiffio.h, tif_unix.c, tif_win32.c, tif_vms.c: add
|
||||||
|
_TIFFcalloc()
|
||||||
|
|
||||||
|
<LI> libtiff/tif_luv.c, tif_lzw.c, tif_packbits.c: return 0 in
|
||||||
|
Encode functions instead of -1 when TIFFFlushData1() fails.
|
||||||
|
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2130
|
||||||
|
|
||||||
|
<LI> libtiff/tif_ojpeg.c: fix leak in
|
||||||
|
OJPEGReadHeaderInfoSecTablesQTable,
|
||||||
|
OJPEGReadHeaderInfoSecTablesDcTable and
|
||||||
|
OJPEGReadHeaderInfoSecTablesAcTable when read fails. Patch by
|
||||||
|
Nicolás Peña. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2659
|
||||||
|
|
||||||
|
<LI> libtiff/tif_jpeg.c: only run JPEGFixupTagsSubsampling() if
|
||||||
|
the YCbCrSubsampling tag is not explicitly present. This helps
|
||||||
|
a bit to reduce the I/O amount when the tag is present
|
||||||
|
(especially on cloud hosted files).
|
||||||
|
|
||||||
|
<LI> libtiff/tif_lzw.c: in LZWPostEncode(), increase, if
|
||||||
|
necessary, the code bit-width after flushing the remaining
|
||||||
|
code and before emitting the EOI code. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=1982
|
||||||
|
|
||||||
|
<LI> libtiff/tif_pixarlog.c: fix memory leak in error code path of
|
||||||
|
PixarLogSetupDecode(). Patch by Nicolás Peña. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2665
|
||||||
|
|
||||||
|
<LI> libtiff/tif_fax3.c, tif_predict.c, tif_getimage.c: fix GCC 7
|
||||||
|
-Wimplicit-fallthrough warnings.
|
||||||
|
|
||||||
|
<LI> libtiff/tif_dirread.c: fix memory leak in non
|
||||||
|
DEFER_STRILE_LOAD mode (ie default) when there is both a
|
||||||
|
StripOffsets and TileOffsets tag, or a StripByteCounts and
|
||||||
|
TileByteCounts Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2689
|
||||||
|
|
||||||
|
<LI> libtiff/tif_ojpeg.c: fix potential memory leak in
|
||||||
|
OJPEGReadHeaderInfoSecTablesQTable,
|
||||||
|
OJPEGReadHeaderInfoSecTablesDcTable and
|
||||||
|
OJPEGReadHeaderInfoSecTablesAcTable Patch by Nicolás Peña.
|
||||||
|
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2670
|
||||||
|
|
||||||
|
<LI> libtiff/tif_fax3.c: avoid crash in Fax3Close() on empty file.
|
||||||
|
Patch by Alan Coopersmith + complement by myself. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2673
|
||||||
|
|
||||||
|
<LI> libtiff/tif_read.c: TIFFFillStrip(): add limitation to the
|
||||||
|
number of bytes read in case td_stripbytecount[strip] is
|
||||||
|
bigger than reasonable, so as to avoid excessive memory
|
||||||
|
allocation.
|
||||||
|
|
||||||
|
<LI> libtiff/tif_zip.c, tif_pixarlog.c, tif_predict.c: fix memory
|
||||||
|
leak when the underlying codec (ZIP, PixarLog) succeeds its
|
||||||
|
setupdecode() method, but PredictorSetup fails. Credit to
|
||||||
|
OSS-Fuzz (locally run, on GDAL)
|
||||||
|
|
||||||
|
<LI> libtiff/tif_read.c: TIFFFillStrip() and TIFFFillTile(): avoid
|
||||||
|
excessive memory allocation in case of shorten files. Only
|
||||||
|
effective on 64 bit builds and non-mapped cases. Credit to
|
||||||
|
OSS-Fuzz (locally run, on GDAL)
|
||||||
|
|
||||||
|
<LI> libtiff/tif_read.c: TIFFFillStripPartial() / TIFFSeek(),
|
||||||
|
avoid potential integer overflows with read_ahead in
|
||||||
|
CHUNKY_STRIP_READ_SUPPORT mode. Should
|
||||||
|
especially occur on 32 bit platforms.
|
||||||
|
|
||||||
|
<LI> libtiff/tif_read.c: TIFFFillStripPartial(): avoid excessive
|
||||||
|
memory allocation in case of shorten files. Only effective on
|
||||||
|
64 bit builds. Credit to OSS-Fuzz (locally run, on GDAL)
|
||||||
|
|
||||||
|
<LI> libtiff/tif_read.c: update tif_rawcc in
|
||||||
|
CHUNKY_STRIP_READ_SUPPORT mode with tif_rawdataloaded when
|
||||||
|
calling TIFFStartStrip() or TIFFFillStripPartial(). This
|
||||||
|
avoids reading beyond tif_rawdata when bytecount >
|
||||||
|
tif_rawdatasize. Fixes
|
||||||
|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1545.
|
||||||
|
Credit to OSS-Fuzz
|
||||||
|
|
||||||
|
<LI> libtiff/tif_color.c: avoid potential int32 overflow in
|
||||||
|
TIFFYCbCrToRGBInit() Fixes
|
||||||
|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1533
|
||||||
|
Credit to OSS-Fuzz
|
||||||
|
|
||||||
|
<LI> libtiff/tif_pixarlog.c, tif_luv.c: avoid potential int32
|
||||||
|
overflows in multiply_ms() and add_ms(). Fixes
|
||||||
|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1558
|
||||||
|
Credit to OSS-Fuzz
|
||||||
|
|
||||||
|
<LI> libtiff/tif_packbits.c: fix out-of-buffer read in
|
||||||
|
PackBitsDecode() Fixes
|
||||||
|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1563
|
||||||
|
Credit to OSS-Fuzz
|
||||||
|
|
||||||
|
<LI> libtiff/tif_luv.c: LogL16InitState(): avoid excessive memory
|
||||||
|
allocation when RowsPerStrip tag is missing.
|
||||||
|
Credit to OSS-Fuzz (locally run, on GDAL)
|
||||||
|
|
||||||
|
<LI> libtiff/tif_lzw.c: update dec_bitsleft at beginning of
|
||||||
|
LZWDecode(), and update tif_rawcc at end of LZWDecode(). This
|
||||||
|
is needed to properly work with the latest chnges in
|
||||||
|
tif_read.c in CHUNKY_STRIP_READ_SUPPORT mode.
|
||||||
|
|
||||||
|
<LI> libtiff/tif_pixarlog.c: PixarLogDecode(): resync tif_rawcp
|
||||||
|
with next_in and tif_rawcc with avail_in at beginning and end
|
||||||
|
of function, similarly to what is done in LZWDecode(). Likely
|
||||||
|
needed so that it works properly with latest chnges in
|
||||||
|
tif_read.c in CHUNKY_STRIP_READ_SUPPORT mode. But untested...
|
||||||
|
|
||||||
|
<LI> libtiff/tif_getimage.c: initYCbCrConversion(): add basic
|
||||||
|
validation of luma and refBlackWhite coefficients (just check
|
||||||
|
they are not NaN for now), to avoid potential float to int
|
||||||
|
overflows. Fixes
|
||||||
|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1663
|
||||||
|
Credit to OSS Fuzz
|
||||||
|
|
||||||
|
<LI> libtiff/tif_read.c: _TIFFVSetField(): fix outside range cast
|
||||||
|
of double to float. Credit to Google Autofuzz project
|
||||||
|
|
||||||
|
<LI> libtiff/tif_getimage.c: initYCbCrConversion(): check luma[1]
|
||||||
|
is not zero to avoid division by zero. Fixes
|
||||||
|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1665
|
||||||
|
Credit to OSS Fuzz
|
||||||
|
|
||||||
|
<LI> libtiff/tif_read.c: _TIFFVSetField(): fix outside range cast
|
||||||
|
of double to float. Credit to Google Autofuzz project
|
||||||
|
|
||||||
|
<LI> libtiff/tif_getimage.c: initYCbCrConversion(): check luma[1]
|
||||||
|
is not zero to avoid division by zero. Fixes
|
||||||
|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1665
|
||||||
|
Credit to OSS Fuzz
|
||||||
|
|
||||||
|
<LI> libtiff/tif_getimage.c: initYCbCrConversion(): stricter
|
||||||
|
validation for refBlackWhite coefficients values. To avoid
|
||||||
|
invalid float->int32 conversion. Fixes
|
||||||
|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1718
|
||||||
|
Credit to OSS Fuzz
|
||||||
|
|
||||||
|
</UL>
|
||||||
|
|
||||||
|
<P><HR WIDTH=65% ALIGN=left>
|
||||||
|
|
||||||
|
<!-------------------------------------------------------------------------->
|
||||||
|
|
||||||
|
<A NAME="tools"><B><FONT SIZE=+3>C</FONT>HANGES IN THE TOOLS:</B></A>
|
||||||
|
|
||||||
|
<UL>
|
||||||
|
|
||||||
|
<LI> tools/fax2tiff.c (main): Applied patch by Jörg Ahrens to fix
|
||||||
|
passing client data for Win32 builds using tif_win32.c
|
||||||
|
(USE_WIN32_FILEIO defined) for file I/O. Patch was provided
|
||||||
|
via email on November 20, 2016.
|
||||||
|
|
||||||
|
<LI> tools/tiffcp.c: avoid uint32 underflow in cpDecodedStrips
|
||||||
|
that can cause various issues, such as buffer overflows in the
|
||||||
|
library. Reported by Agostino Sarubbo. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2598
|
||||||
|
|
||||||
|
<LI> tools/tiffcrop.c: fix readContigStripsIntoBuffer() in -i
|
||||||
|
(ignore) mode so that the output buffer is correctly
|
||||||
|
incremented to avoid write outside bounds. Reported by
|
||||||
|
Agostino Sarubbo. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2620
|
||||||
|
|
||||||
|
<LI> tools/tiffcrop.c: add 3 extra bytes at end of strip buffer in
|
||||||
|
readSeparateStripsIntoBuffer() to avoid read outside of heap
|
||||||
|
allocated buffer. Reported by Agostino Sarubbo. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2621
|
||||||
|
|
||||||
|
<LI> tools/tiffcrop.c: fix integer division by zero when
|
||||||
|
BitsPerSample is missing. Reported by Agostino Sarubbo.
|
||||||
|
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2619
|
||||||
|
|
||||||
|
<LI> tools/tiffinfo.c: fix null pointer dereference in -r mode
|
||||||
|
when the image has no StripByteCount tag. Reported by
|
||||||
|
Agostino Sarubbo. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2594
|
||||||
|
|
||||||
|
<LI> tools/tiffcp.c: avoid potential division by zero is
|
||||||
|
BitsPerSamples tag is missing. Reported by Agostino Sarubbo.
|
||||||
|
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2597
|
||||||
|
|
||||||
|
<LI> tools/tif_dir.c: when TIFFGetField(, TIFFTAG_NUMBEROFINKS, )
|
||||||
|
is called, limit the return number of inks to SamplesPerPixel,
|
||||||
|
so that code that parses ink names doesn't go past the end of
|
||||||
|
the buffer. Reported by Agostino Sarubbo. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2599
|
||||||
|
|
||||||
|
<LI> tools/tiffcp.c: avoid potential division by zero is
|
||||||
|
BitsPerSamples tag is missing. Reported by Agostino Sarubbo.
|
||||||
|
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2607
|
||||||
|
|
||||||
|
<LI> tools/tiffcp.c: fix uint32 underflow/overflow that can cause
|
||||||
|
heap-based buffer overflow. Reported by Agostino Sarubbo.
|
||||||
|
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2610
|
||||||
|
|
||||||
|
<LI> tools/tiffcp.c: replace assert( (bps % 8) == 0 ) by a non
|
||||||
|
assert check. Reported by Agostino Sarubbo. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2605
|
||||||
|
|
||||||
|
<LI> tools/tiff2ps.c: fix 2 heap-based buffer overflows (in
|
||||||
|
PSDataBW and PSDataColorContig). Reported by Agostino Sarubbo.
|
||||||
|
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2633 and
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2634.
|
||||||
|
|
||||||
|
<LI> tools/tiff2pdf.c: prevent heap-based buffer overflow in -j
|
||||||
|
mode on a paletted image. Note: this fix errors out before the
|
||||||
|
overflow happens. There could probably be a better fix. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2635
|
||||||
|
|
||||||
|
<LI> tools/tiff2pdf.c: fix wrong usage of memcpy() that can
|
||||||
|
trigger unspecified behaviour. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2638
|
||||||
|
|
||||||
|
<LI> tools/tiff2pdf.c: avoid potential invalid memory read in
|
||||||
|
t2p_writeproc. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2639
|
||||||
|
|
||||||
|
<LI> tools/tiff2pdf.c: avoid potential heap-based overflow in
|
||||||
|
t2p_readwrite_pdf_image_tile(). Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2640
|
||||||
|
|
||||||
|
<LI> tools/tiffcrop.c: remove extraneous TIFFClose() in error code
|
||||||
|
path, that caused double free. Related to
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2535
|
||||||
|
|
||||||
|
<LI> tools/tiffcp.c: error out cleanly in cpContig2SeparateByRow
|
||||||
|
and cpSeparate2ContigByRow if BitsPerSample != 8 to avoid heap
|
||||||
|
based overflow. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2656 and
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2657
|
||||||
|
|
||||||
|
<LI> tools/raw2tiff.c: avoid integer division by zero. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2631
|
||||||
|
|
||||||
|
<LI> tools/tiff2ps.c: call TIFFClose() in error code paths.
|
||||||
|
|
||||||
|
<LI> tools/fax2tiff.c: emit appropriate message if the input file
|
||||||
|
is empty. Patch by Alan Coopersmith. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2672
|
||||||
|
|
||||||
|
<LI> tools/tiff2bw.c: close TIFF handle in error code path. Fixes
|
||||||
|
http://bugzilla.maptools.org/show_bug.cgi?id=2677
|
||||||
|
|
||||||
|
</UL>
|
||||||
|
|
||||||
|
<P><HR WIDTH=65% ALIGN=left>
|
||||||
|
|
||||||
|
<!--------------------------------------------------------------------------->
|
||||||
|
|
||||||
|
<A NAME="contrib"><B><FONT SIZE=+3>C</FONT>HANGES IN THE CONTRIB AREA:</B></A>
|
||||||
|
|
||||||
|
<UL>
|
||||||
|
|
||||||
|
<LI> None
|
||||||
|
|
||||||
|
</UL>
|
||||||
|
|
||||||
|
Last updated $Date: 2017-05-21 17:47:46 $.
|
||||||
|
|
||||||
|
</BODY>
|
||||||
|
</HTML>
|
@ -335,8 +335,6 @@ dist_man1_MANS = \
|
|||||||
pal2rgb.1 \
|
pal2rgb.1 \
|
||||||
ppm2tiff.1 \
|
ppm2tiff.1 \
|
||||||
raw2tiff.1 \
|
raw2tiff.1 \
|
||||||
rgb2ycbcr.1 \
|
|
||||||
thumbnail.1 \
|
|
||||||
tiff2bw.1 \
|
tiff2bw.1 \
|
||||||
tiff2pdf.1 \
|
tiff2pdf.1 \
|
||||||
tiff2ps.1 \
|
tiff2ps.1 \
|
||||||
|
Loading…
Reference in New Issue
Block a user