Package "tiff"
Name: |
tiff
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- TIFF manipulation and conversion tools
- TIFF manipulation and conversion tools
|
Latest version: |
4.0.6-1ubuntu0.8 |
Release: |
xenial (16.04) |
Level: |
security |
Repository: |
universe |
Links
Other versions of "tiff" in Xenial
Packages in group
Deleted packages are displayed in grey.
Changelog
tiff (4.0.6-1ubuntu0.8) xenial-security; urgency=medium
* SECURITY UPDATE: Integer overflow in tif_getimage.c
- debian/patches/CVE-2020-35523.patch: check Tile width for overflow in
libtiff/tif_getimage.c.
- CVE-2020-35523
* SECURITY UPDATE: Heap-based buffer overflow in TIFF2PDF tool
- debian/patches/CVE-2020-35524.patch: properly calculate datasize when
saving to JPEG YCbCr in tools/tiff2pdf.c.
- CVE-2020-35524
-- Marc Deslauriers <email address hidden> Thu, 25 Feb 2021 07:38:05 -0500
|
Source diff to previous version |
|
tiff (4.0.6-1ubuntu0.7) xenial-security; urgency=medium
* SECURITY UPDATE: incorrect integer overflow checks
- debian/patches/CVE-2019-14973.patch: fix implementation-defined
behaviour in libtiff/tif_aux.c, libtiff/tif_getimage.c,
libtiff/tif_luv.c, libtiff/tif_pixarlog.c, libtiff/tif_read.c,
libtiff/tif_strip.c, libtiff/tif_tile.c, libtiff/tiffiop.h.
- debian/libtiff5.symbols: added new symbols.
- CVE-2019-14973
* SECURITY UPDATE: heap-based buffer overflow via crafted RGBA image
- debian/patches/CVE-2019-17546.patch: fix integer overflow in
libtiff/tif_getimage.c.
- CVE-2019-17546
-- Marc Deslauriers <email address hidden> Wed, 16 Oct 2019 09:57:14 -0400
|
Source diff to previous version |
CVE-2019-14973 |
_TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through 4.0.10 mishandle Integer Overflow checks because they rely on compiler behavio |
CVE-2019-17546 |
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-ba |
|
tiff (4.0.6-1ubuntu0.6) xenial-security; urgency=medium
* SECURITY UPDATE: heap over-read in TIFFWriteScanline
- debian/patches/CVE-2018-10779.patch: fix overflow in
libtiff/tif_write.c.
- CVE-2018-10779
* SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
- debian/patches/CVE-2018-12900-1.patch: check for overflow in
tools/tiffcp.c.
- debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
- CVE-2018-12900
- CVE-2019-7663
* SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
- debian/patches/CVE-2018-17000.patch: add NULL check in
libtiff/tif_dirwrite.c.
- CVE-2018-17000
* SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
- debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
if necessary in libtiff/tif_dir.c.
- debian/patches/CVE-2018-19210-2.patch: fix warning in
libtiff/tif_dir.c.
- CVE-2018-19210
* SECURITY UPDATE: memory leak in TIFFFdOpen
- debian/patches/CVE-2019-6128.patch: properly handle errors in
tools/pal2rgb.c.
- CVE-2019-6128
-- Marc Deslauriers <email address hidden> Mon, 11 Mar 2019 12:50:36 -0400
|
Source diff to previous version |
CVE-2018-10779 |
TIFFWriteScanline in tif_write.c in LibTIFF 3.8.2 has a heap-based buffer over-read, as demonstrated by bmp2tiff. |
CVE-2018-12900 |
Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service |
CVE-2019-7663 |
An Invalid Address dereference was discovered in TIFFWriteDirectoryTagTransferfunction in libtiff/tif_dirwrite.c in LibTIFF 4.0.10, affecting the cpS |
CVE-2018-17000 |
A NULL pointer dereference in the function _TIFFmemcmp at tif_unix.c (called from TIFFWriteDirectoryTagTransferfunction) in LibTIFF 4.0.9 allows an a |
CVE-2018-19210 |
In LibTIFF 4.0.9, there is a NULL pointer dereference in the TIFFWriteDirectorySec function in tif_dirwrite.c that will lead to a denial of service a |
CVE-2019-6128 |
The TIFFFdOpen function in tif_unix.c in LibTIFF 4.0.10 has a memory leak, as demonstrated by pal2rgb. |
|
tiff (4.0.6-1ubuntu0.5) xenial-security; urgency=medium
* SECURITY UPDATE: NULL dereference in TIFFPrintDirectory
- debian/patches/CVE-2018-7456.patch: properly handle color channels in
libtiff/tif_dirread.c, libtiff/tif_print.c.
- CVE-2018-7456
* SECURITY UPDATE: buffer overflow in LZWDecodeCompat
- debian/patches/CVE-2018-8905.patch: fix logic in libtiff/tif_lzw.c.
- CVE-2018-8905
* SECURITY UPDATE: DoS in TIFFWriteDirectorySec()
- debian/patches/CVE-2018-10963.patch: avoid assertion in
libtiff/tif_dirwrite.c.
- CVE-2018-10963
* SECURITY UPDATE: multiple overflows
- debian/patches/CVE-2018-1710x.patch: Avoid overflows in
tools/pal2rgb.c, tools/tiff2bw.c, tools/ppm2tiff.c.
- CVE-2018-17100
- CVE-2018-17101
* SECURITY UPDATE: JBIGDecode out-of-bounds write
- debian/patches/CVE-2018-18557.patch: fix issue in libtiff/tif_jbig.c,
libtiff/tif_read.c.
- CVE-2018-18557
* SECURITY UPDATE: NULL pointer dereference in LZWDecode
- debian/patches/CVE-2018-18661.patch: add checks to tools/tiff2bw.c.
- CVE-2018-18661
-- Marc Deslauriers <email address hidden> Thu, 17 Jan 2019 09:21:11 -0500
|
Source diff to previous version |
CVE-2018-7456 |
A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 4.0.9 when using the tiffinfo tool to print crafted TI |
CVE-2018-8905 |
In LibTIFF 4.0.9, a heap-based buffer overflow occurs in the function LZWDecodeCompat in tif_lzw.c via a crafted TIFF file, as demonstrated by tiff2p |
CVE-2018-10963 |
The TIFFWriteDirectorySec() function in tif_dirwrite.c in LibTIFF through 4.0.9 allows remote attackers to cause a denial of service (assertion failu |
CVE-2018-1710 |
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.1, 10.5, and 11.1 tool db2licm is affected by buffer overflow vulnerability that |
CVE-2018-17100 |
An issue was discovered in LibTIFF 4.0.9. There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) o |
CVE-2018-17101 |
An issue was discovered in LibTIFF 4.0.9. There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a deni |
CVE-2018-18557 |
LibTIFF 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG into a buffer, ignoring the buffer size, which leads to a tif_jbig.c JBIGDecode out- |
CVE-2018-18661 |
An issue was discovered in LibTIFF 4.0.9. There is a NULL pointer dereference in the function LZWDecode in the file tif_lzw.c. |
|
tiff (4.0.6-1ubuntu0.4) xenial-security; urgency=medium
* SECURITY UPDATE: buffer overflow in gif2tiff
- debian/patches/CVE-2016-3186.patch: check return code in
tools/gif2tiff.c.
- CVE-2016-3186
* SECURITY UPDATE: buffer overflow in gif2tiff
- debian/patches/CVE-2016-5102.patch: make warning fatal in
tools/gif2tiff.c.
- CVE-2016-5102
* SECURITY UPDATE: multiple overflows
- debian/patches/CVE-2016-5318.patch: ignore certain fields in
libtiff/tif_dir.h, libtiff/tif_dirinfo.c, libtiff/tif_dirread.c.
- CVE-2016-5318
- CVE-2017-9147
* SECURITY UPDATE: bmp2tiff issues
- debian/patches/CVE-2017-5563_9117.patch: add check to
tools/bmp2tiff.c.
- CVE-2017-5563
- CVE-2017-9117
* SECURITY UPDATE: heap-based buffer overflow in t2p_write_pdf
- debian/patches/CVE-2017-9935-1.patch: fix transfer function handling
in libtiff/tif_dir.c, tools/tiff2pdf.c.
- debian/patches/CVE-2017-9935-2.patch: fix incorrect type for transfer
table in tools/tiff2pdf.c.
- CVE-2017-9935
* SECURITY UPDATE: DoS in TIFFOpen
- debian/patches/CVE-2017-11613-1.patch: avoid memory exhaustion in
libtiff/tif_dirread.c.
- debian/patches/CVE-2017-11613-2.patch: rework fix in
libtiff/tif_dirread.c.
- CVE-2017-11613
* SECURITY UPDATE: TIFFSetupStrips heap overflow in pal2rgb
- debian/patches/CVE-2017-17095.patch: add workaround to
tools/pal2rgb.c.
- CVE-2017-17095
-- Marc Deslauriers <email address hidden> Thu, 22 Mar 2018 10:16:37 -0400
|
CVE-2016-3186 |
Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) |
CVE-2016-5102 |
Buffer overflow in the readgifimage function in gif2tiff.c in the gif2tiff tool in LibTIFF 4.0.6 allows remote attackers to cause a denial of service |
CVE-2016-5318 |
Stack-based buffer overflow in the _TIFFVGetField function in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafte |
CVE-2017-9147 |
LibTIFF 4.0.7 has an invalid read in the _TIFFVGetField function in tif_dir.c, which might allow remote attackers to cause a denial of service (crash |
CVE-2017-5563 |
LibTIFF version 4.0.7 is vulnerable to a heap-based buffer over-read in tif_lzw.c resulting in DoS or code execution via a crafted bmp image to tools |
CVE-2017-9117 |
In LibTIFF 4.0.7, the program processes BMP images without verifying that biWidth and biHeight in the bitmap-information header match the actual inpu |
CVE-2017-9935 |
In LibTIFF 4.0.8, there is a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different |
CVE-2017-11613 |
In LibTIFF 4.0.8, there is a denial of service vulnerability in the TIFFOpen function. A crafted input will lead to a denial of service attack. Durin |
CVE-2017-17095 |
tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and appl |
|
About
-
Send Feedback to @ubuntu_updates