35b7f035a7
release.
400 lines
16 KiB
HTML
400 lines
16 KiB
HTML
<HTML>
|
|
<HEAD>
|
|
<TITLE>
|
|
Changes in TIFF v4.0.7
|
|
</TITLE>
|
|
</HEAD>
|
|
|
|
<BODY BGCOLOR=white>
|
|
<FONT FACE="Helvetica, Arial, Sans">
|
|
|
|
<BASEFONT SIZE=4>
|
|
<B><FONT SIZE=+3>T</FONT>IFF <FONT SIZE=+2>C</FONT>HANGE <FONT SIZE=+2>I</FONT>NFORMATION</B>
|
|
<BASEFONT SIZE=3>
|
|
|
|
<UL>
|
|
<HR SIZE=4 WIDTH=65% ALIGN=left>
|
|
<B>Current Version</B>: v4.0.7<BR>
|
|
<B>Previous Version</B>: <A HREF=v4.0.6.html>v4.0.6</a><BR>
|
|
<B>Master FTP Site</B>: <A HREF="ftp://download.osgeo.org/libtiff">
|
|
download.osgeo.org</a>, directory pub/libtiff</A><BR>
|
|
<B>Master HTTP Site #1</B>: <A HREF="http://www.simplesystems.org/libtiff/">
|
|
http://www.simplesystems.org/libtiff/</a><BR>
|
|
<B>Master HTTP Site #2</B>: <A HREF="http://libtiff.maptools.org/">
|
|
http://libtiff.maptools.org/</a>
|
|
<HR SIZE=4 WIDTH=65% ALIGN=left>
|
|
</UL>
|
|
|
|
<P>
|
|
This document describes the changes made to the software between the
|
|
<I>previous</I> and <I>current</I> versions (see above). If you don't
|
|
find something listed here, then it was not done in this timeframe, or
|
|
it was not considered important enough to be mentioned. The following
|
|
information is located here:
|
|
<UL>
|
|
<LI><A HREF="#highlights">Major Changes</A>
|
|
<LI><A HREF="#configure">Changes in the software configuration</A>
|
|
<LI><A HREF="#libtiff">Changes in libtiff</A>
|
|
<LI><A HREF="#tools">Changes in the tools</A>
|
|
<LI><A HREF="#contrib">Changes in the contrib area</A>
|
|
</UL>
|
|
<p>
|
|
<P><HR WIDTH=65% ALIGN=left>
|
|
|
|
<!--------------------------------------------------------------------------->
|
|
|
|
<A NAME="highlights"><B><FONT SIZE=+3>M</FONT>AJOR CHANGES:</B></A>
|
|
|
|
<UL>
|
|
|
|
<LI> The libtiff tools bmp2tiff, gif2tiff, ras2tiff, sgi2tiff,
|
|
sgisv, and ycbcr are completely removed from the distribution.
|
|
These tools were written in the late 1980s and early 1990s for
|
|
test and demonstration purposes. In some cases the tools were
|
|
never updated to support updates to the file format, or the
|
|
file formats are now rarely used. In all cases these tools
|
|
increased the libtiff security and maintenance exposure beyond
|
|
the value offered by the tool.
|
|
|
|
</UL>
|
|
|
|
|
|
<P><HR WIDTH=65% ALIGN=left>
|
|
<!--------------------------------------------------------------------------->
|
|
|
|
<A NAME="configure"><B><FONT SIZE=+3>C</FONT>HANGES IN THE SOFTWARE CONFIGURATION:</B></A>
|
|
|
|
<UL>
|
|
|
|
<LI> None
|
|
|
|
</UL>
|
|
|
|
<P><HR WIDTH=65% ALIGN=left>
|
|
|
|
<!--------------------------------------------------------------------------->
|
|
|
|
<A NAME="libtiff"><B><FONT SIZE=+3>C</FONT>HANGES IN LIBTIFF:</B></A>
|
|
|
|
<UL>
|
|
|
|
<LI> libtiff/tif_aux.c: fix crash in TIFFVGetFieldDefaulted() when
|
|
requesting Predictor tag and that the zip/lzw codec is not
|
|
configured. Fixes
|
|
http://bugzilla.maptools.org/show_bug.cgi?id=2591
|
|
|
|
<LI> libtiff/tif_dirread.c: in TIFFFetchNormalTag(), make sure
|
|
that values of tags with TIFF_SETGET_C16_ASCII /
|
|
TIFF_SETGET_C32_ASCII access are null terminated, to avoid
|
|
potential read outside buffer in _TIFFPrintField(). Fixes
|
|
http://bugzilla.maptools.org/show_bug.cgi?id=2590
|
|
|
|
<LI> libtiff/tif_dirread.c: reject images with OJPEG compression
|
|
that have no TileOffsets/StripOffsets tag, when OJPEG
|
|
compression is disabled. Prevent null pointer dereference in
|
|
TIFFReadRawStrip1() and other functions that expect
|
|
td_stripbytecount to be non NULL. Fixes
|
|
http://bugzilla.maptools.org/show_bug.cgi?id=2585
|
|
|
|
<LI> tools/tiffcrop.c: fix multiple uint32 overflows in
|
|
writeBufferToSeparateStrips(), writeBufferToContigTiles() and
|
|
writeBufferToSeparateTiles() that could cause heap buffer
|
|
overflows. Reported by Henri Salo from Nixu Corporation.
|
|
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2592
|
|
|
|
<LI> libtiff/tif_strip.c: make TIFFNumberOfStrips() return the
|
|
td->td_nstrips value when it is non-zero, instead of
|
|
recomputing it. This is needed in TIFF_STRIPCHOP mode where
|
|
td_nstrips is modified. Fixes a read outsize of array in
|
|
tiffsplit (or other utilities using TIFFNumberOfStrips()).
|
|
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2587
|
|
(CVE-2016-9273)
|
|
|
|
<LI> libtiff/tif_predict.h, libtiff/tif_predict.c: Replace
|
|
assertions by runtime checks to avoid assertions in debug
|
|
mode, or buffer overflows in release mode. Can happen when
|
|
dealing with unusual tile size like YCbCr with
|
|
subsampling. Reported as MSVR 35105 by Axel Souchet & Vishal
|
|
Chauhan from the MSRC Vulnerabilities & Mitigations
|
|
|
|
<LI> libtiff/tif_dir.c: discard values of SMinSampleValue and
|
|
SMaxSampleValue when they have been read and the value of
|
|
SamplesPerPixel is changed afterwards (like when reading a
|
|
OJPEG compressed image with a missing SamplesPerPixel tag, and
|
|
whose photometric is RGB or YCbCr, forcing SamplesPerPixel
|
|
being 3). Otherwise when rewriting the directory (for example
|
|
with tiffset, we will expect 3 values whereas the array had
|
|
been allocated with just one), thus causing a out of bound
|
|
read access. Fixes
|
|
http://bugzilla.maptools.org/show_bug.cgi?id=2500
|
|
(CVE-2014-8127, duplicate: CVE-2016-3658)
|
|
|
|
<LI> libtiff/tif_dirwrite.c: avoid null pointer dereference on
|
|
td_stripoffset when writing directory, if FIELD_STRIPOFFSETS
|
|
was artificially set for a hack case in OJPEG case. Fixes
|
|
http://bugzilla.maptools.org/show_bug.cgi?id=2500
|
|
(CVE-2014-8127, duplicate: CVE-2016-3658)
|
|
|
|
<LI> libtiff/tif_getimage.c (TIFFRGBAImageOK): Reject attempts to
|
|
read floating point images.
|
|
|
|
<LI> libtiff/tif_predict.c (PredictorSetup): Enforce
|
|
bits-per-sample requirements of floating point predictor (3).
|
|
Fixes CVE-2016-3622 "Divide By Zero in the tiff2rgba tool."
|
|
|
|
<LI> libtiff/tif_pixarlog.c: fix out-of-bounds write vulnerabilities
|
|
in heap allocated buffers. Reported as MSVR 35094. Discovered by
|
|
Axel Souchet and Vishal Chauhan from the MSRC Vulnerabilities &
|
|
Mitigations team.
|
|
|
|
<LI> libtiff/tif_write.c: fix issue in error code path of
|
|
TIFFFlushData1() that didn't reset the tif_rawcc and tif_rawcp
|
|
members. I'm not completely sure if that could happen in
|
|
practice outside of the odd behaviour of t2p_seekproc() of
|
|
tiff2pdf). The report points that a better fix could be to
|
|
check the return value of TIFFFlushData1() in places where it
|
|
isn't done currently, but it seems this patch is enough.
|
|
Reported as MSVR 35095. Discovered by Axel Souchet & Vishal
|
|
Chauhan & Suha Can from the MSRC Vulnerabilities & Mitigations
|
|
team.
|
|
|
|
<LI> libtiff/tif_pixarlog.c: Fix write buffer overflow in
|
|
PixarLogEncode if more input samples are provided than
|
|
expected by PixarLogSetupEncode. Idea based on
|
|
libtiff-CVE-2016-3990.patch from
|
|
libtiff-4.0.3-25.el7_2.src.rpm by Nikola Forro, but with
|
|
different and simpler check. (bugzilla #2544)
|
|
|
|
<LI> libtiff/tif_read.c: Fix out-of-bounds read on memory-mapped
|
|
files in TIFFReadRawStrip1() and TIFFReadRawTile1() when
|
|
stripoffset is beyond tmsize_t max value (reported by Mathias
|
|
Svensson)
|
|
|
|
<LI> libtiff/tif_read.c: make TIFFReadEncodedStrip() and
|
|
TIFFReadEncodedTile() directly use user provided buffer when
|
|
no compression (and other conditions) to save a memcpy()
|
|
|
|
<LI> libtiff/tif_write.c: make TIFFWriteEncodedStrip() and
|
|
TIFFWriteEncodedTile() directly use user provided buffer when
|
|
no compression to save a memcpy().
|
|
|
|
<LI> libtiff/tif_luv.c: validate that for COMPRESSION_SGILOG and
|
|
PHOTOMETRIC_LOGL, there is only one sample per pixel. Avoid
|
|
potential invalid memory write on corrupted/unexpected images
|
|
when using the TIFFRGBAImageBegin() interface (reported by
|
|
Clay Wood)
|
|
|
|
<LI> libtiff/tif_pixarlog.c: fix potential buffer write overrun in
|
|
PixarLogDecode() on corrupted/unexpected images (reported by
|
|
Mathias Svensson) (CVE-2016-5875)
|
|
|
|
<LI> libtiff/libtiff.def: Added _TIFFMultiply32 and
|
|
_TIFFMultiply64 to libtiff.def
|
|
|
|
<LI> libtiff/tif_config.vc.h (HAVE_SNPRINTF): Add a '1' to the
|
|
HAVE_SNPRINTF definition.
|
|
|
|
<LI> libtiff/tif_config.vc.h (HAVE_SNPRINTF): Applied patch by
|
|
Edward Lam to define HAVE_SNPRINTF for Visual Studio 2015.
|
|
|
|
<LI> libtiff/tif_dirread.c: when compiled with DEFER_STRILE_LOAD,
|
|
fix regression, introduced on 2014-12-23, when reading a
|
|
one-strip file without a StripByteCounts tag. GDAL #6490
|
|
|
|
<LI> libtiff/*: upstream typo fixes (mostly contributed by Kurt
|
|
Schwehr) coming from GDAL internal libtiff
|
|
|
|
<LI> libtiff/tif_fax3.h: make Param member of TIFFFaxTabEnt
|
|
structure a uint16 to reduce size of the binary.
|
|
|
|
<LI> libtiff/tif_read.c, tif_dirread.c: fix indentation issues
|
|
raised by GCC 6 -Wmisleading-indentation
|
|
|
|
<LI> libtiff/tif_pixarlog.c: avoid zlib error messages to pass a
|
|
NULL string to %s formatter, which is undefined behaviour in
|
|
sprintf().
|
|
|
|
<LI> libtiff/tif_next.c: fix potential out-of-bound write in NeXTDecode()
|
|
triggered by http://lcamtuf.coredump.cx/afl/vulns/libtiff5.tif
|
|
(bugzilla #2508)
|
|
|
|
<LI> libtiff/tif_luv.c: fix potential out-of-bound writes in
|
|
decode functions in non debug builds by replacing assert()s by
|
|
regular if checks (bugzilla #2522). Fix potential
|
|
out-of-bound reads in case of short input data.
|
|
|
|
<LI> libtiff/tif_getimage.c: fix out-of-bound reads in
|
|
TIFFRGBAImage interface in case of unsupported values of
|
|
SamplesPerPixel/ExtraSamples for LogLUV / CIELab. Add explicit
|
|
call to TIFFRGBAImageOK() in TIFFRGBAImageBegin(). Fix
|
|
CVE-2015-8665 reported by limingxing and CVE-2015-8683
|
|
reported by zzf of Alibaba.
|
|
|
|
<LI> libtiff/tif_dirread.c: workaround false positive warning of
|
|
Clang Static Analyzer about null pointer dereference in
|
|
TIFFCheckDirOffset().
|
|
|
|
<LI> libtiff/tif_fax3.c: remove dead assignment in
|
|
Fax3PutEOLgdal(). Found by Clang Static Analyzer
|
|
|
|
<LI> libtiff/tif_dirwrite.c: fix truncation to 32 bit of file
|
|
offsets in TIFFLinkDirectory() and TIFFWriteDirectorySec()
|
|
when aligning directory offsets on a even offset (affects
|
|
BigTIFF). This was a regression of the changeset of
|
|
2015-10-19.
|
|
|
|
<LI> libtiff/tif_write.c: TIFFWriteEncodedStrip() and
|
|
TIFFWriteEncodedTile() should return -1 in case of failure of
|
|
tif_encodestrip() as documented
|
|
|
|
<LI> libtiff/tif_dumpmode.c: DumpModeEncode() should return 0 in
|
|
case of failure so that the above mentionned functions detect
|
|
the error.
|
|
|
|
<LI> libtiff/*.c: fix MSVC warnings related to cast shortening and
|
|
assignment within conditional expression
|
|
|
|
<LI> libtiff/*.c: fix clang -Wshorten-64-to-32 warnings
|
|
|
|
<LI> libtiff/tif_dirread.c: prevent reading ColorMap or
|
|
TransferFunction if BitsPerPixel > 24, so as to avoid huge
|
|
memory allocation and file read attempts
|
|
|
|
<LI> libtiff/tif_dirread.c: remove duplicated assignment (reported
|
|
by Clang static analyzer)
|
|
|
|
<LI> libtiff/tif_dir.c, libtiff/tif_dirinfo.c,
|
|
libtiff/tif_compress.c, libtiff/tif_jpeg_12.c: suppress
|
|
warnings about 'no previous declaration/prototype'
|
|
|
|
<LI> libtiff/tiffiop.h, libtiff/tif_dirwrite.c: suffix constants
|
|
by U to fix 'warning: negative integer implicitly converted to
|
|
unsigned type' warning (part of -Wconversion)
|
|
|
|
<LI> libtiff/tif_dir.c, libtiff/tif_dirread.c,
|
|
libtiff/tif_getimage.c, libtiff/tif_print.c: fix -Wshadow
|
|
warnings (only in libtiff/)
|
|
|
|
</UL>
|
|
|
|
<P><HR WIDTH=65% ALIGN=left>
|
|
|
|
<!-------------------------------------------------------------------------->
|
|
|
|
<A NAME="tools"><B><FONT SIZE=+3>C</FONT>HANGES IN THE TOOLS:</B></A>
|
|
|
|
<UL>
|
|
|
|
<LI> tools/Makefile.am: The libtiff tools bmp2tiff, gif2tiff,
|
|
ras2tiff, sgi2tiff, sgisv, and ycbcr are completely removed
|
|
from the distribution. The libtiff tools rgb2ycbcr and
|
|
thumbnail are only built in the build tree for testing. Old
|
|
files are put in new 'archive' subdirectory of the source
|
|
repository, but not in distribution archives. These changes
|
|
are made in order to lessen the maintenance burden.
|
|
|
|
<LI> tools/tiff2pdf.c: avoid undefined behaviour related to
|
|
overlapping of source and destination buffer in memcpy() call
|
|
in t2p_sample_rgbaa_to_rgb() Fixes
|
|
http://bugzilla.maptools.org/show_bug.cgi?id=2577
|
|
|
|
<LI> tools/tiff2pdf.c: fix potential integer overflows on 32 bit
|
|
builds in t2p_read_tiff_size() Fixes
|
|
http://bugzilla.maptools.org/show_bug.cgi?id=2576
|
|
|
|
<LI> tools/fax2tiff.c: fix segfault when specifying -r without
|
|
argument. Patch by Yuriy M. Kaminskiy. Fixes
|
|
http://bugzilla.maptools.org/show_bug.cgi?id=2572
|
|
|
|
<LI> tools/tiffinfo.c: fix out-of-bound read on some tiled images.
|
|
(http://bugzilla.maptools.org/show_bug.cgi?id=2517)
|
|
|
|
<LI> tools/tiffcrop.c: fix out-of-bound read of up to 3 bytes in
|
|
readContigTilesIntoBuffer(). Reported as MSVR 35092 by Axel
|
|
Souchet & Vishal Chauhan from the MSRC Vulnerabilities &
|
|
Mitigations team.
|
|
|
|
<LI> tools/tiff2pdf.c: fix write buffer overflow of 2 bytes on
|
|
JPEG compressed images. Reported by Tyler Bohan of Cisco Talos
|
|
as TALOS-CAN-0187 / CVE-2016-5652. Also prevents writing 2
|
|
extra uninitialized bytes to the file stream.
|
|
|
|
<LI> tools/tiffcp.c: fix out-of-bounds write on tiled images with odd
|
|
tile width vs image width. Reported as MSVR 35103
|
|
by Axel Souchet and Vishal Chauhan from the MSRC Vulnerabilities &
|
|
Mitigations team.
|
|
|
|
<LI> tools/tiff2pdf.c: fix read -largely- outsize of buffer in
|
|
t2p_readwrite_pdf_image_tile(), causing crash, when reading a
|
|
JPEG compressed image with TIFFTAG_JPEGTABLES length being
|
|
one. Reported as MSVR 35101 by Axel Souchet and Vishal
|
|
Chauhan from the MSRC Vulnerabilities & Mitigations team.
|
|
|
|
<LI> tools/tiffcp.c: fix read of undefined variable in case of
|
|
missing required tags. Found on test case of MSVR 35100.
|
|
|
|
<LI> tools/tiffcrop.c: fix read of undefined buffer in
|
|
readContigStripsIntoBuffer() due to uint16 overflow. Probably
|
|
not a security issue but I can be wrong. Reported as MSVR
|
|
35100 by Axel Souchet from the MSRC Vulnerabilities &
|
|
Mitigations team.
|
|
|
|
<LI> tools/tiffcrop.c: fix various out-of-bounds write
|
|
vulnerabilities in heap or stack allocated buffers. Reported
|
|
as MSVR 35093, MSVR 35096 and MSVR 35097. Discovered by Axel
|
|
Souchet and Vishal Chauhan from the MSRC Vulnerabilities &
|
|
Mitigations team.
|
|
|
|
<LI> tools/tiff2pdf.c: fix out-of-bounds write vulnerabilities in
|
|
heap allocate buffer in t2p_process_jpeg_strip(). Reported as
|
|
MSVR 35098. Discovered by Axel Souchet and Vishal Chauhan from
|
|
the MSRC Vulnerabilities & Mitigations team.
|
|
|
|
<LI> tools/tiff2bw.c: fix weight computation that could result of
|
|
color value overflow (no security implication). Fix bugzilla
|
|
#2550. Patch by Frank Freudenberg.
|
|
|
|
<LI> tools/rgb2ycbcr.c: validate values of -v and -h parameters to
|
|
avoid potential divide by zero. Fixes CVE-2016-3623 (bugzilla #2569)
|
|
|
|
<LI> tools/tiffcrop.c: Fix out-of-bounds write in loadImage().
|
|
From patch libtiff-CVE-2016-3991.patch from
|
|
libtiff-4.0.3-25.el7_2.src.rpm by Nikola Forro (bugzilla
|
|
#2543)
|
|
|
|
|
|
<LI> tools/tiff2rgba.c: Fix integer overflow in size of allocated
|
|
buffer, when -b mode is enabled, that could result in
|
|
out-of-bounds write. Based initially on patch
|
|
tiff-CVE-2016-3945.patch from libtiff-4.0.3-25.el7_2.src.rpm
|
|
by Nikola Forro, with correction for invalid tests that
|
|
rejected valid files. (bugzilla #2545)
|
|
|
|
<LI> tools/tiffcrop.c: Avoid access outside of stack allocated
|
|
array on a tiled separate TIFF with more than 8 samples per
|
|
pixel. Reported by Kaixiang Zhang of the Cloud Security Team,
|
|
Qihoo 360 (CVE-2016-5321 / CVE-2016-5323 , bugzilla #2558 /
|
|
#2559)
|
|
|
|
<LI> tools/tiffdump.c: fix a few misaligned 64-bit reads warned by
|
|
-fsanitize
|
|
|
|
</UL>
|
|
|
|
<P><HR WIDTH=65% ALIGN=left>
|
|
|
|
<!--------------------------------------------------------------------------->
|
|
|
|
<A NAME="contrib"><B><FONT SIZE=+3>C</FONT>HANGES IN THE CONTRIB AREA:</B></A>
|
|
|
|
<UL>
|
|
|
|
<LI> None
|
|
|
|
</UL>
|
|
|
|
Last updated $Date: 2016-11-12 18:30:47 $.
|
|
|
|
</BODY>
|
|
</HTML>
|