Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

tiff-4.0.7-17.3.1 RPM for aarch64

From OpenSuSE 42.2 updates for aarch64

Name: tiff Distribution: openSUSE Leap 42.2
Version: 4.0.7 Vendor: openSUSE
Release: 17.3.1 Build date: Tue Apr 18 12:19:57 2017
Group: Productivity/Graphics/Convertors Build host: obs-arm-2
Size: 3121943 Source RPM: tiff-4.0.7-17.3.1.src.rpm
Packager: http://bugs.opensuse.org
Url: http://www.remotesensing.org/libtiff
Summary: Tools for Converting from and to the Tiff Format
This package contains the library and support programs for the TIFF
image format.

Provides

Requires

License

HPND

Changelog

* Wed Mar 29 2017 fstrba@suse.com
  - Added patches:
    * tiff-CVE-2016-10266.patch
      + Upstream fix for CVE-2016-10266, LibTIFF 4.0.7 allows remote
      attackers to cause a denial of service (divide-by-zero error
      and application crash) via a crafted TIFF image (bsc#1031263)
    * tiff-CVE-2016-10267.patch
      + Upstream fix for CVE-2016-10267, LibTIFF 4.0.7 allows remote
      attackers to cause a denial of service (divide-by-zero error
      and application crash) via a crafted TIFF image (bsc#1031262)
    * tiff-CVE-2016-10268.patch
      + Upstream fix for CVE-2016-10268, LibTIFF 4.0.7 allows remote
      attackers to cause a denial of service (divide-by-zero error
      and application crash) via a crafted TIFF image (bsc#1031255)
    * tiff-CVE-2016-10269.patch
      + Upstream fix for CVE-2016-10269, LibTIFF 4.0.7 allows remote
      attackers to cause a denial of service (heap-based buffer
      over-read) or possibly have unspecified other impact via a
      crafted TIFF image (bsc#1031254)
    * tiff-CVE-2016-10270.patch
      + Upstream fix for CVE-2016-10270, LibTIFF 4.0.7 allows remote
      attackers to cause a denial of service (heap-based buffer
      over-read) or possibly have unspecified other impact via a
      crafted TIFF image (bsc#1031250)
    * tiff-CVE-2016-10271.patch
      + Upstream fix for CVE-2016-10271, LibTIFF 4.0.7 allows remote
    attackers to cause a denial of service (heap-based buffer
    over-read and buffer overflow) or possibly have unspecified
    other impact via a crafted TIFF image (bsc#1031249)
    * tiff-CVE-2016-10272.patch
      + Upstream fix for CVE-2016-10272, LibTIFF 4.0.7 allows remote
    attackers to cause a denial of service (heap-based buffer
    overflow) or possibly have unspecified other impact via a
    crafted TIFF image (bsc#1031247)
* Thu Feb 02 2017 fstrba@suse.com
  - Added patch:
    * tiff-4.0.7-TIFFTAG_FAXRECVPARAMS.patch
    - Fix a regression introduced in 4.0.7 (bsc#1022103)
    - http://bugzilla.maptools.org/show_bug.cgi?id=2636
* Fri Jan 13 2017 fstrba@suse.com
  - Added patch:
    * tiff-4.0.7-CVE-2017-5225.patch
    - Upstream fix for CVE-2017-5225, bsc#1019611: heap buffer
      overflow in tools/tiffcp via a crafted BitsPerSample value
* Thu Dec 08 2016 fstrba@suse.com
  - Bring back the bmp2tiff, gif2tiff, ras2tiff, thumbnail and
    rgb2ycbcr tools
* Tue Nov 29 2016 fstrba@suse.com
  - Upgrade to upstream release 4.0.7
    * libtiff/tif_aux.c
      + Fix crash in TIFFVGetFieldDefaulted() when requesting
      Predictor tag and that the zip/lzw codec is not configured.
      Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2591
    * libtiff/tif_compress.c
      + Make TIFFNoDecode() return 0 to indicate an error and make
      upper level read routines treat it accordingly. (linked to the
      test case of http://bugzilla.maptools.org/show_bug.cgi?id=2517)
    * libtiff/tif_dir.c
      + Discard values of SMinSampleValue and SMaxSampleValue when
      they have been read and the value of SamplesPerPixel is
      changed afterwards (like when reading a OJPEG compressed image
      with a missing SamplesPerPixel tag, and whose photometric is
      RGB or YCbCr, forcing SamplesPerPixel being 3). Otherwise when
      rewriting the directory (for example with tiffset, we will
      expect 3 values whereas the array had been allocated with just
      one), thus causing a out of bound read access. Fixes
      http://bugzilla.maptools.org/show_bug.cgi?id=2500
      (CVE-2014-8127, bsc#914890, duplicate: CVE-2016-3658, bsc#974840)
    * libtiff/tif_dirread.c
      + In TIFFFetchNormalTag(), do not dereference NULL pointer when
      values of tags with TIFF_SETGET_C16_ASCII/TIFF_SETGET_C32_ASCII
      access are 0-byte arrays. Fixes
      http://bugzilla.maptools.org/show_bug.cgi?id=2593 (regression
      introduced by previous fix done on 2016-11-11 for
      CVE-2016-9297, bsc#1010161). Assigned as CVE-2016-9448,
      bsc#1011103
      + In TIFFFetchNormalTag(), make sure that values of tags with
      TIFF_SETGET_C16_ASCII/TIFF_SETGET_C32_ASCII access are null
      terminated, to avoid potential read outside buffer in
      _TIFFPrintField(). Fixes
      http://bugzilla.maptools.org/show_bug.cgi?id=2590
      (CVE-2016-9297, bsc#1010161)
      + Initialize doubledata at line 3693 to NULL to please MSVC 2013
      + Prevent reading ColorMap or TransferFunction if
      BitsPerPixel > 24, so as to avoid huge memory allocation and
      file read attempts
      + Reject images with OJPEG compression that have no
      TileOffsets/StripOffsets tag, when OJPEG compression is
      disabled. Prevent null pointer dereference in
      TIFFReadRawStrip1() and other functions that expect
      td_stripbytecount to be non NULL. Fixes
      http://bugzilla.maptools.org/show_bug.cgi?id=2585
      + When compiled with DEFER_STRILE_LOAD, fix regression, when
      reading a one-strip file without a StripByteCounts tag.
      + Workaround false positive warning of Clang Static Analyzer
      about null pointer dereference in TIFFCheckDirOffset().
    * libtiff/tif_dirwrite.c
      + Avoid null pointer dereference on td_stripoffset when writing
      directory, if FIELD_STRIPOFFSETS was artificially set for a
      hack case in OJPEG case. Fixes
      http://bugzilla.maptools.org/show_bug.cgi?id=2500
      (CVE-2014-8127, bsc#914890, duplicate: CVE-2016-3658,
      bsc#974840)
      + Fix truncation to 32 bit of file offsets in TIFFLinkDirectory()
      and TIFFWriteDirectorySec() when aligning directory offsets on
      an even offset (affects BigTIFF).
    * libtiff/tif_dumpmode.c
      + DumpModeEncode() should return 0 in case of failure so that
      the above mentionned functions detect the error.
    * libtiff/tif_fax3.c
      + remove dead assignment in Fax3PutEOLgdal().
    * libtiff/tif_fax3.h
      + make Param member of TIFFFaxTabEnt structure a uint16 to
      reduce size of the binary.
    * libtiff/tif_getimage.c
      + Fix out-of-bound reads in TIFFRGBAImage interface in case of
      unsupported values of SamplesPerPixel/ExtraSamples for
      LogLUV/CIELab. Add explicit call to TIFFRGBAImageOK() in
      TIFFRGBAImageBegin(). Fix CVE-2015-8665 and CVE-2015-8683.
      + Fix some benign warnings which appear in 64-bit compilation
      under Microsoft Visual Studio of the form "Arithmetic
      overflow: 32-bit value is shifted, then cast to 64-bit value.
      Results might not be an expected value."
      + TIFFRGBAImageOK: Reject attempts to read floating point images.
    * libtiff/tif_luv.c
      + Fix potential out-of-bound writes in decode functions in non
      debug builds by replacing assert()s by regular if checks
      (http://bugzilla.maptools.org/show_bug.cgi?id=2522). Fix
      potential out-of-bound reads in case of short input data.
      + Validate that for COMPRESSION_SGILOG and PHOTOMETRIC_LOGL,
      there is only one sample per pixel. Avoid potential invalid
      memory write on corrupted/unexpected images when using the
      TIFFRGBAImageBegin() interface
    * libtiff/tif_next.c
      + Fix potential out-of-bound write in NeXTDecode()
      (http://bugzilla.maptools.org/show_bug.cgi?id=2508)
    * libtiff/tif_pixarlog.c
      + Avoid zlib error messages to pass a NULL string to %s
      formatter, which is undefined behaviour in sprintf().
      + Fix out-of-bounds write vulnerabilities in heap allocated
      buffers. Reported as MSVR 35094.
      + Fix potential buffer write overrun in PixarLogDecode() on
      corrupted/unexpected images (CVE-2016-5875, bsc#987351)
      + Fix write buffer overflow in PixarLogEncode if more input
      samples are provided than expected by PixarLogSetupEncode.
      Idea based on libtiff-CVE-2016-3990.patch from
      libtiff-4.0.3-25.el7_2.src.rpm, but with different and simpler
      check. (http://bugzilla.maptools.org/show_bug.cgi?id=2544,
      bsc#975069)
    * libtiff/tif_predict.c
      + PredictorSetup: Enforce bits-per-sample requirements of
      floating point predictor (3). Fixes CVE-2016-3622 "Divide By
      Zero in the tiff2rgba tool." (bsc#974449)
    * libtiff/tif_predict.h, libtiff/tif_predict.c
      + Replace assertions by runtime checks to avoid assertions in
      debug mode, or buffer overflows in release mode. Can happen
      when dealing with unusual tile size like YCbCr with
      subsampling. Reported as MSVR 35105.
    * libtiff/tif_read.c
      + Fix out-of-bounds read on memory-mapped files in
      TIFFReadRawStrip1() and TIFFReadRawTile1() when stripoffset
      is beyond tmsize_t max value
      + Make TIFFReadEncodedStrip() and TIFFReadEncodedTile() directly
      use user provided buffer when no compression (and other
      conditions) to save a memcpy().
    * libtiff/tif_strip.c
      + Make TIFFNumberOfStrips() return the td->td_nstrips value when
      it is non-zero, instead of recomputing it. This is needed in
      TIFF_STRIPCHOP mode where td_nstrips is modified. Fixes a read
      outsize of array in tiffsplit (or other utilities using
      TIFFNumberOfStrips()). Fixes
      http://bugzilla.maptools.org/show_bug.cgi?id=2587
      (CVE-2016-9273, bsc#1010163)
    * libtiff/tif_write.c
      + Fix issue in error code path of TIFFFlushData1() that didn't
      reset the tif_rawcc and tif_rawcp members. I'm not completely
      sure if that could happen in practice outside of the odd
      behaviour of t2p_seekproc() of tiff2pdf). The report points
      that a better fix could be to check the return value of
      TIFFFlushData1() in places where it isn't done currently, but
      it seems this patch is enough. Reported as MSVR 35095.
      + Make TIFFWriteEncodedStrip() and TIFFWriteEncodedTile()
      directly use user provided buffer when no compression to save
      a memcpy().
      + TIFFWriteEncodedStrip() and TIFFWriteEncodedTile() should
      return -1 in case of failure of tif_encodestrip() as documented
    * tools/fax2tiff.c
      + Fix segfault when specifying -r without argument. Fixes
      http://bugzilla.maptools.org/show_bug.cgi?id=2572
    * tools/Makefile.am
      + The libtiff tools bmp2tiff, gif2tiff, ras2tiff, sgi2tiff,
      sgisv, and ycbcr are completely removed from the distribution.
      The libtiff tools rgb2ycbcr and thumbnail are only built in
      the build tree for testing. Old files are put in new 'archive'
      subdirectory of the source repository, but not in
      distribution archives. These changes are made in order to
      lessen the maintenance burden.
    * tools/rgb2ycbcr.c
      + Validate values of -v and -h parameters to avoid potential
      divide by zero. (http://bugzilla.maptools.org/show_bug.cgi?id=2569)
    * tools/tiff2bw.c
      + Fix weight computation that could result of color value
      overflow (no security implication). Fix
      http://bugzilla.maptools.org/show_bug.cgi?id=2550.
    * tools/tiff2pdf.c
      + Avoid undefined behaviour related to overlapping of source and
      destination buffer in memcpy() call in
      t2p_sample_rgbaa_to_rgb() Fixes
      http://bugzilla.maptools.org/show_bug.cgi?id=2577
      + Fix out-of-bounds write vulnerabilities in heap allocate buffer
      in t2p_process_jpeg_strip(). Reported as MSVR 35098.
      + Fix potential integer overflows on 32 bit builds in
      t2p_read_tiff_size() Fixes
      http://bugzilla.maptools.org/show_bug.cgi?id=2576
      + Fix read -largely- outsize of buffer in
      t2p_readwrite_pdf_image_tile(), causing crash, when reading a
      JPEG compressed image with TIFFTAG_JPEGTABLES length being one.
      Reported as MSVR 35101. CVE-2016-9453, bsc#1011107
      + Fix write buffer overflow of 2 bytes on JPEG compressed images.
      Reported as TALOS-CAN-0187, CVE-2016-5652, bsc#1007280. Also
      prevents writing 2 extra uninitialized bytes to the file
      stream.
    * tools/tiff2rgba.c
      + Fix integer overflow in size of allocated buffer, when -b mode
      is enabled, that could result in out-of-bounds write. Based
      initially on patch tiff-CVE-2016-3945.patch from
      libtiff-4.0.3-25.el7_2.src.rpm, with correction for invalid
      tests that rejected valid files.
      (http://bugzilla.maptools.org/show_bug.cgi?id=2545, bsc#974614)
    * tools/tiffcp.c
      + Fix out-of-bounds write on tiled images with odd tile width vs
      image width. Reported as MSVR 35103.
      + Fix read of undefined variable in case of missing required
      tags. Found on test case of MSVR 35100.
    * tools/tiffcrop.c
      + Avoid access outside of stack allocated array on a tiled
      separate TIFF with more than 8 samples per pixel.
      (CVE-2016-5321, CVE-2016-5323,
      http://bugzilla.maptools.org/show_bug.cgi?id=2558,
      http://bugzilla.maptools.org/show_bug.cgi?id=2559, bsc#984813,
      bsc#984815)
      + Fix memory leak in (recent) error code path. Fixes Coverity
      1394415.
      + Fix multiple uint32 overflows in writeBufferToSeparateStrips(),
      writeBufferToContigTiles() and writeBufferToSeparateTiles()
      that could cause heap buffer overflows. Fixes
      http://bugzilla.maptools.org/show_bug.cgi?id=2592
      + Fix out-of-bound read of up to 3 bytes in
      readContigTilesIntoBuffer(). Reported as MSVR 35092.
      + Fix out-of-bounds write in loadImage(). From patch
      libtiff-CVE-2016-3991.patch from
      libtiff-4.0.3-25.el7_2.src.rpm
      (http://bugzilla.maptools.org/show_bug.cgi?id=2543, bsc#975070)
      + Fix read of undefined buffer in readContigStripsIntoBuffer()
      due to uint16 overflow. Reported as MSVR 35100.
      + Fix various out-of-bounds write vulnerabilities in heap or
      stack allocated buffers. Reported as MSVR 35093, MSVR 35096
      and MSVR 35097.
      + readContigTilesIntoBuffer: Fix signed/unsigned comparison
      warning.
    * tools/tiffdump.c
      + Fix a few misaligned 64-bit reads warned by -fsanitize
      + ReadDirectory: Remove uint32 cast to_TIFFmalloc() argument
      which resulted in Coverity report. Added more mutiplication
      overflow checks
    * tools/tiffinfo.c
      + Fix out-of-bound read on some tiled images.
      (http://bugzilla.maptools.org/show_bug.cgi?id=2517)
      + TIFFReadContigTileData: Fix signed/unsigned comparison warning.
      + TIFFReadSeparateTileData: Fix signed/unsigned comparison
      warning.
  - Removed patches:
    * tiff-4.0.4-uninitialized_mem_NeXTDecode.patch
    * tiff-4.0.6-CVE-2015-8782.patch
    * tiff-4.0.6-CVE-2016-3186.patch
    * tiff-4.0.6-CVE-2016-3623.patch
    * tiff-4.0.6-CVE-2016-3945.patch
    * tiff-4.0.6-CVE-2016-3990.patch
    * tiff-4.0.6-CVE-2016-3991.patch
    * tiff-4.0.6-libtiff-tif_getimage.c-TIFFRGBAImageOK-Reject-attemp.patch
    * tiff-4.0.6-libtiff-tif_luv.c-validate-that-for-COMPRESSION_SGIL.patch
    * tiff-4.0.6-libtiff-tif_pixarlog.c-fix-potential-buffer-write-ov.patch
    * tiff-4.0.6-libtiff-tif_read.c-make-TIFFReadEncodedStrip-and.patch
    * tiff-4.0.6-tools-tiffcrop.c-fix-various-out-of-bounds-write-vul.patch
    - Fixed in the upsteam release
  - Changed patch:
    * tiff-4.0.6-CVE-2015-7554.patch -> tiff-4.0.7-CVE-2015-7554.patch
    - Rediffed to the changed context
* Thu Oct 06 2016 fstrba@suse.com
  - Added patches:
    * tiff-4.0.6-tools-tiffcrop.c-fix-various-out-of-bounds-write-vul.patch
    - Upstream fixes for MSVR 35093, MSVR 35094, MSVR 35095,
      MSVR 35096, MSVR 35097, MSVR 35098.
    * tiff-4.0.6-libtiff-tif_getimage.c-TIFFRGBAImageOK-Reject-attemp.patch
    - Enforce bits-per-sample requirements of floating point
      predictor. Fixes CVE-2016-3622 [bsc#974449]
* Thu Sep 01 2016 fstrba@suse.com
  - Added patches:
    * tiff-4.0.6-CVE-2016-3623.patch
    * tiff-4.0.6-CVE-2016-3945.patch
    * tiff-4.0.6-CVE-2016-3990.patch
    * tiff-4.0.6-CVE-2016-3991.patch
    - Upstream commits to fix CVE-2016-3623 [bsc#974618],
      CVE-2016-3945 [bsc#974614], CVE-2016-3990 [bsc#975069],
      CVE-2016-3991 [bsc#975070]
* Tue Jul 12 2016 fstrba@suse.com
  - Added patches:
    * tiff-4.0.6-libtiff-tif_luv.c-validate-that-for-COMPRESSION_SGIL.patch
    * tiff-4.0.6-libtiff-tif_pixarlog.c-fix-potential-buffer-write-ov.patch
    * tiff-4.0.6-libtiff-tif_read.c-make-TIFFReadEncodedStrip-and.patch
    - Upstream commits to fix CVE-2016-5314 [bsc#984831],
      CVE-2016-5316 [bsc#984837], CVE-2016-5317 [bsc#984842],
      CVE-2016-5320 [bsc#984808] and CVE-2016-5875 [bsc#987351]
* Wed Apr 06 2016 fstrba@suse.com
  - Added patch:
    * tiff-4.0.6-CVE-2016-3186.patch
    - fix CVE-2016-3186: buffer overflow in gif2tiff [bsc#973340]
* Mon Feb 01 2016 fstrba@suse.com
  - Added patch:
    * tiff-4.0.6-CVE-2015-8782.patch
    - fix CVE-2015-8781, CVE-2015-8782, CVE-2015-8783: Out-of-bounds
      writes for invalid images (upstream bug #2522) [bsc#964225]
* Wed Jan 13 2016 fstrba@suse.com
  - Added patch:
    * tiff-4.0.6-CVE-2015-7554.patch
    - fix CVE-2015-7554: Out-of-bounds Write in the thumbnail and
      tiffcmp tools (upsteam bug #2499) [bsc#960341]
* Mon Jan 11 2016 kstreitova@suse.com
  - Added patch:
    * tiff-4.0.4-uninitialized_mem_NeXTDecode.patch
    - fix uninitialized memory in NeXTDecode (upstream bug #2508)
      [bsc#942690]
* Tue Dec 08 2015 p.drouand@gmail.com
  - Update to version 4.0.6
    * Supports CMake 2.8.9 and later.
    * Add missing file which wasn't being distributed, causing unit
      tests to fail.
    * Make shared/static library building configurable.
    * CMake reads all version information directly from configure.ac
      to avoid duplication of values.
    * CMake builds are now included in 'distcheck' target.
    * Autotools 'make distcheck' now tests the CMake-based build if
      CMake is available.
    * Fixes to avoid undefined behaviour of signed types (C standard
      compliance).
    * Fixes to avoid possible isses when casting to unsigned char.
    * Fixes to avoid undefined behaviour with shifts.
    * Fix generation of output with 16 bit or 32 bit integer, when
      byte swapping is needed, in horizontal predictor (#2521).
    * Fix decoding when there is a single pixel to decode
      (unlikely case...) and byte swapping is involved.
    * Add add explicit masking with 0xff before casting to uchar in
      floating-point horizontal differencing and accumulation routines.
    * Eliminate requirement for and use of 64-bit constant values.
    * tiffgt : Silence glut API deprecation warnings on MacOS X.
    * fax2ps : Detect failure to write to temporary file.
  - Changes from version 4.0.5
    * Support for configure/build using CMake.
    * Support for large (> 2GB) files under Microsoft Windows.
    * Configuration and building using CMake is now supported under
      Microsoft Windows and on Unix-type systems.
    * Test for and use fseeko() if it is available. This allows supporting
      large files on Unix-type systems with a 32-bit 'long' type and a
      64-bit 'off_t' type.
    * tiffiop.h: Macros added to use 64-bit equivalents for all standard
      I/O and POSIX APIs used by libtiff and its tools which are limited
      to 2GB in Windows builds. Note that these 64-bit equivalents were
      introduced by the CRT provided with Visual Studio 2005 and if the
      necessary CRT is not installed on the target computer, the program
      will not run. The wrapper macros will not be activated unless the
      definition _MSC_VER is at least 1400 or __MSVCRT_VERSION__ is at
      least 0x800.
    * tif_unix.c: Updated to support large files under Microsoft Windows.
      This makes tif_unix.c a completely viable candidate for use under
      Windows (in spite of its name) if the CRT is modern enough. Please
      note that tif_win32.c already supported large files, but only
      'tiffinfo' and 'tiffdump' made any provision to support large files
      under Windows.
    * _tiffReadProc() and _tiffWriteProc() are modified to chunk I/O to a
      maximum size of 2GB for extremely large I/O requests. This surmounts
      limitations in the Microsoft Windows read() and write() APIs (which
      are limited to the range of a 32-bit 'int'), and may avoid poor
      behavior with extremely large I/O requests on other systems.
    * Updated to use I/O wrapper macros from tiffiop.h in order to
      support large files under Microsoft Windows.
* Tue Aug 04 2015 kstreitova@suse.com
  - use spec-cleaner
* Wed Jul 01 2015 pgajdos@suse.com
  - update to 4.0.4
    D    tiff-4.0.3-double-free.patch
    D    tiff-handle-TIFFTAG_CONSECUTIVEBADFAXLINES.patch
    D    tiff-4.0.3-CVE-2013-1961.patch
    D    erouault.2862.patch
    D    bfriesen.2805.patch
    D    tiff-4.0.3-CVE-2013-4232.patch
    D    tiff-4.0.3-CVE-2013-4244.patch
    D    erouault.2861.patch
    D    erouault.2857.patch
    D    erouault.2856.patch
    D    erouault.2859.patch
    D    tiff-4.0.3-CVE-2012-4564.patch
    D    tiff-4.0.3-tiff2pdf-colors.patch
    D    erouault.2876.patch
    D    erouault.2860.patch
    D    tiff-dither-malloc-check.patch
    D    tiff-4.0.3-CVE-2013-1960.patch
    D    erouault.2858.patch
    D    tiff-handle-TIFFTAG_PREDICTOR.patch
    D    tiff-4.0.3-CVE-2013-4231.patch
    D    tiff-4.0.3-CVE-2013-4243.patch
    D    erouault.2863.patch
    D    tiff-4.0.3-test-jpeg-turbo.patch
* Thu Feb 26 2015 pgajdos@suse.com
  - security update: CVE-2014-9655, CVE-2014-8127, CVE-2014-8128,
      CVE-2014-8129, CVE-2014-8130, CVE-2015-1547
      bnc#914890, bnc#916925, bnc#916927
    + erouault.2856.patch
    + erouault.2857.patch
    + erouault.2858.patch
    + erouault.2859.patch
    + erouault.2860.patch
    + erouault.2861.patch
    + erouault.2862.patch
    + erouault.2863.patch
    + erouault.2876.patch
    + bfriesen.2805.patch
    + tiff-handle-TIFFTAG_CONSECUTIVEBADFAXLINES.patch
    + tiff-handle-TIFFTAG_PREDICTOR.patch
    + tiff-dither-malloc-check.patch
* Mon Dec 22 2014 meissner@suse.com
  - build with PIE
* Wed Aug 21 2013 pgajdos@suse.com
  - security update
    * CVE-2013-4232.patch [bnc#834477]
    * CVE-2013-4231.patch [bnc#834477]
    * CVE-2013-4244.patch [bnc#834788]
    * CVE-2013-4243.patch [bnc#834779]
* Wed Jun 26 2013 pgajdos@suse.com
  - tiff2pdf: introduced warning when the compression isn't lzw or
    none [bnc#819142]
  - tiff2pdf: fixed crash [bnc#821872]
* Tue Apr 30 2013 pgajdos@suse.com
  - security update
    * CVE-2013-1961.patch [bnc#818117]
    * CVE-2013-1960.patch [bnc#817573]
* Fri Apr 05 2013 idonmez@suse.com
  - Add Source URL, see https://en.opensuse.org/SourceUrls
* Mon Nov 05 2012 pgajdos@suse.com
  - updated to 4.0.3:
    * Add some TIFF/FX support in libtiff.
    * Fix bug rewriting image tiles in a compressed file.
    * Fix read past end of data buffer.
    * etc., see ChangeLog
  - removed upstreamed patches:
    * bigendian.patch
    * dont-fancy-upsampling.patch
    * CVE-2012-3401.patch
  - new patch:
    * test-jpeg-turbo.patch
    * CVE-2012-4564.patch [bnc#787892]
* Mon Jul 23 2012 pgajdos@suse.com
  -  fixed CVE-2012-3401 [bnc#770816]
* Thu Jun 28 2012 meissner@suse.com
  - RGBA is packed in host order, use the right macros to unpack
    and verify in raw_decode test.
* Wed Jun 20 2012 pgajdos@suse.com
  - updated to 4.0.2: [bnc#767852] [bnc#767854]
      tif_getimage.c: added support for _SEPARATED CMYK images.
      tif_getimage.c: Added support for greyscale + alpha.
      Added TIFFCreateCustomDirectory() and TIFFCreateEXIFDirectory() functions.
      tif_print.c: Lots of fixes around printing corrupt or hostile input.
      Improve handling of corrupt ycbcrsubsampling values.
      tif_unix.c: use strerror to get meaningful error messages.
      tif_jpeg.c: fix serious bugs in JPEGDecodeRaw().
      tif_jpeg.c: Fix size overflow (zdi-can-1221,CVE-2012-1173).
      tiff2pdf: Defend against integer overflows while calculating required
      buffer sizes (CVE-2012-2113).
* Tue Apr 10 2012 brian@aljex.com
  - Fix building on older targets from SUSE 10.0 to current.
  - Add jbig support
* Thu Mar 29 2012 idonmez@suse.com
  - Add lzma support
  - Implement %check
  - Drop visibility patch because it breaks compilation
* Wed Mar 28 2012 i@marguerite.su
  - change package name libtiff4 to libtiff5.
    library number is 5 actually.
* Wed Mar 28 2012 i@marguerite.su
  - Update to 4.0.1
    * configure.ac
    - Add libtiff private dependency on -llzma for pkg-config
    - Add support for using library symbol versioning on
      ELF systems with the GNU linker.
    * libtiff/tif_win32.c: Eliminate some minor 64-bit warnings in
      tif_win32.c
    * libtiff/tif_jpeg.c: Extra caution for case where sp is NULL.
    * libtiff/tif_dir.c, libtiff/tif_dirread.c: Extra caution around
      assumption tag fetching is always successful.
    * libtiff/tiffio.h: Use double-underbar syntax in GCC printf
      attribute specification to lessen the risk of accidental macro
      substitution.
    * Update automake used to 1.11.3.
* Wed Mar 28 2012 cfarrell@suse.com
  - license update: HPND
    tiff license most akin to spdx recognised
    http://www.spdx.org/licenses/HPND
* Tue Jan 10 2012 crrodriguez@opensuse.org
  - remove libjpeg-devel and zlib-devel from libtiff-devel
    requires as they are _not_ required to use the library.
    Now, this _will_ break packages with wrong buildrequires
    for good.
* Tue Jan 10 2012 crrodriguez@opensuse.org
  - Hide private symbols using gcc visibility, this has been
    applied only to functions that the source code clearly states
    that are internal to the library.
  - Run spec cleaner
* Wed Nov 23 2011 coolo@suse.com
  - add libtool as buildrequire to avoid implicit dependency
* Fri Aug 05 2011 crrodriguez@opensuse.org
  - Do not use -fno-strict-aliasing, no longer needed
    and will probably slow down the code.
  - Fix self-obsoletion warning
* Thu Apr 14 2011 pgajdos@suse.cz
  - updated to 3.9.5:
    * fixed integer overflow CVE-2010-4665
    * fixed buffer overflow in ojpeg decoder
    * upstreamed:
    - oob-read.patch
    - CVE-2011-0192.patch
    - getimage-64bit.patch
    - CVE-2011-1167.patch
    - scanlinesize.patch
* Thu Mar 31 2011 pgajdos@suse.cz
  - fixed regression caused by previous update [bnc#682871]
    * modified CVE-2011-0192.patch
  - fixed buffer overflow in thunder decoder [bnc#683337]
    * added CVE-2011-1167.patch
* Thu Feb 17 2011 pgajdos@suse.cz
  - fixed buffer overflow [bnc#672510]
    * CVE-2011-0192.patch
* Mon Sep 06 2010 pgajdos@suse.cz
  - fixed "Possibly exploitable memory corruption issue in libtiff"
    (see http://bugzilla.maptools.org/show_bug.cgi?id=2228)
    [bnc#624215]
    * scanlinesize.patch
  - fixed crash while using libjpeg7 and higher
    * dont-fancy-upsampling.patch
* Mon Jul 12 2010 pgajdos@suse.cz
  - updated to 3.9.4: fixes CVE-2010-2065 -- obsoletes
    * integer-overflow.patch
    * NULL-deref.patch
  - fixes CVE-2010-2067
* Wed Jun 23 2010 pgajdos@suse.cz
  - fixed CVE-2010-2065
    * integer-overflow.patch
    * NULL-deref.patch
  -  fixed out of bounds read
    * oob-read.patch
  -  fixed CVE-2010-2233
    * getimage-64bit.patch
  - [bnc#612879]
* Mon Apr 26 2010 pgajdos@suse.cz
  - fixed tiff2pdf output [bnc#599475]
* Fri Mar 26 2010 pgajdos@suse.cz
  - fixed typo
* Tue Mar 16 2010 pgajdos@suse.cz
  - updated to 3.9.2: fixed many CVE's and obsoletes almost all
    our patches (see ChangeLog for details)
* Tue Dec 15 2009 jengelh@medozas.de
  - add baselibs.conf as a source
  - enable parallel building
* Thu Aug 06 2009 pgajdos@suse.cz
  - fixed integer overflows [bnc#519796]
    * CVE-2009-2347.patch
* Thu Jul 02 2009 nadvornik@suse.cz
  - fixed lzw overflow CVE-2009-2285 [bnc#518698]

Files

/usr/bin/bmp2tiff
/usr/bin/fax2ps
/usr/bin/fax2tiff
/usr/bin/gif2tiff
/usr/bin/pal2rgb
/usr/bin/ppm2tiff
/usr/bin/ras2tiff
/usr/bin/raw2tiff
/usr/bin/rgb2ycbcr
/usr/bin/thumbnail
/usr/bin/tiff2bw
/usr/bin/tiff2pdf
/usr/bin/tiff2ps
/usr/bin/tiff2rgba
/usr/bin/tiffcmp
/usr/bin/tiffcp
/usr/bin/tiffcrop
/usr/bin/tiffdither
/usr/bin/tiffdump
/usr/bin/tiffinfo
/usr/bin/tiffmedian
/usr/bin/tiffset
/usr/bin/tiffsplit
/usr/share/doc/packages/tiff
/usr/share/doc/packages/tiff/COPYRIGHT
/usr/share/doc/packages/tiff/ChangeLog
/usr/share/doc/packages/tiff/README
/usr/share/doc/packages/tiff/RELEASE-DATE
/usr/share/doc/packages/tiff/TODO
/usr/share/doc/packages/tiff/VERSION
/usr/share/doc/packages/tiff/html
/usr/share/doc/packages/tiff/html/CMakeLists.txt
/usr/share/doc/packages/tiff/html/TIFFTechNote2.html
/usr/share/doc/packages/tiff/html/addingtags.html
/usr/share/doc/packages/tiff/html/bugs.html
/usr/share/doc/packages/tiff/html/build.html
/usr/share/doc/packages/tiff/html/contrib.html
/usr/share/doc/packages/tiff/html/document.html
/usr/share/doc/packages/tiff/html/images
/usr/share/doc/packages/tiff/html/images.html
/usr/share/doc/packages/tiff/html/images/CMakeLists.txt
/usr/share/doc/packages/tiff/html/images/back.gif
/usr/share/doc/packages/tiff/html/images/bali.jpg
/usr/share/doc/packages/tiff/html/images/cat.gif
/usr/share/doc/packages/tiff/html/images/cover.jpg
/usr/share/doc/packages/tiff/html/images/cramps.gif
/usr/share/doc/packages/tiff/html/images/dave.gif
/usr/share/doc/packages/tiff/html/images/info.gif
/usr/share/doc/packages/tiff/html/images/jello.jpg
/usr/share/doc/packages/tiff/html/images/jim.gif
/usr/share/doc/packages/tiff/html/images/note.gif
/usr/share/doc/packages/tiff/html/images/oxford.gif
/usr/share/doc/packages/tiff/html/images/quad.jpg
/usr/share/doc/packages/tiff/html/images/ring.gif
/usr/share/doc/packages/tiff/html/images/smallliz.jpg
/usr/share/doc/packages/tiff/html/images/strike.gif
/usr/share/doc/packages/tiff/html/images/warning.gif
/usr/share/doc/packages/tiff/html/index.html
/usr/share/doc/packages/tiff/html/internals.html
/usr/share/doc/packages/tiff/html/intro.html
/usr/share/doc/packages/tiff/html/libtiff.html
/usr/share/doc/packages/tiff/html/man
/usr/share/doc/packages/tiff/html/man/CMakeLists.txt
/usr/share/doc/packages/tiff/html/man/HtmlDoc.cmake
/usr/share/doc/packages/tiff/html/man/TIFFClose.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFDataWidth.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFError.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFFieldDataType.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFFieldName.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFFieldPassCount.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFFieldReadCount.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFFieldTag.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFFieldWriteCount.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFFlush.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFGetField.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFOpen.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFPrintDirectory.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFRGBAImage.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFReadDirectory.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFReadEncodedStrip.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFReadEncodedTile.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFReadRGBAImage.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFReadRGBAStrip.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFReadRGBATile.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFReadRawStrip.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFReadRawTile.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFReadScanline.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFReadTile.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFSetDirectory.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFSetField.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFWarning.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFWriteDirectory.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFWriteEncodedStrip.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFWriteEncodedTile.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFWriteRawStrip.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFWriteRawTile.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFWriteScanline.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFWriteTile.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFbuffer.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFcodec.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFcolor.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFmemory.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFquery.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFsize.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFstrip.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFswab.3tiff.html
/usr/share/doc/packages/tiff/html/man/TIFFtile.3tiff.html
/usr/share/doc/packages/tiff/html/man/bmp2tiff.1.html
/usr/share/doc/packages/tiff/html/man/fax2ps.1.html
/usr/share/doc/packages/tiff/html/man/fax2tiff.1.html
/usr/share/doc/packages/tiff/html/man/gif2tiff.1.html
/usr/share/doc/packages/tiff/html/man/index.html
/usr/share/doc/packages/tiff/html/man/libtiff.3tiff.html
/usr/share/doc/packages/tiff/html/man/pal2rgb.1.html
/usr/share/doc/packages/tiff/html/man/ppm2tiff.1.html
/usr/share/doc/packages/tiff/html/man/ras2tiff.1.html
/usr/share/doc/packages/tiff/html/man/raw2tiff.1.html
/usr/share/doc/packages/tiff/html/man/rgb2ycbcr.1.html
/usr/share/doc/packages/tiff/html/man/thumbnail.1.html
/usr/share/doc/packages/tiff/html/man/tiff2bw.1.html
/usr/share/doc/packages/tiff/html/man/tiff2pdf.1.html
/usr/share/doc/packages/tiff/html/man/tiff2ps.1.html
/usr/share/doc/packages/tiff/html/man/tiff2rgba.1.html
/usr/share/doc/packages/tiff/html/man/tiffcmp.1.html
/usr/share/doc/packages/tiff/html/man/tiffcp.1.html
/usr/share/doc/packages/tiff/html/man/tiffcrop.1.html
/usr/share/doc/packages/tiff/html/man/tiffdither.1.html
/usr/share/doc/packages/tiff/html/man/tiffdump.1.html
/usr/share/doc/packages/tiff/html/man/tiffgt.1.html
/usr/share/doc/packages/tiff/html/man/tiffinfo.1.html
/usr/share/doc/packages/tiff/html/man/tiffmedian.1.html
/usr/share/doc/packages/tiff/html/man/tiffset.1.html
/usr/share/doc/packages/tiff/html/man/tiffsplit.1.html
/usr/share/doc/packages/tiff/html/misc.html
/usr/share/doc/packages/tiff/html/support.html
/usr/share/doc/packages/tiff/html/tools.html
/usr/share/doc/packages/tiff/html/v3.4beta007.html
/usr/share/doc/packages/tiff/html/v3.4beta016.html
/usr/share/doc/packages/tiff/html/v3.4beta018.html
/usr/share/doc/packages/tiff/html/v3.4beta024.html
/usr/share/doc/packages/tiff/html/v3.4beta028.html
/usr/share/doc/packages/tiff/html/v3.4beta029.html
/usr/share/doc/packages/tiff/html/v3.4beta031.html
/usr/share/doc/packages/tiff/html/v3.4beta032.html
/usr/share/doc/packages/tiff/html/v3.4beta033.html
/usr/share/doc/packages/tiff/html/v3.4beta034.html
/usr/share/doc/packages/tiff/html/v3.4beta035.html
/usr/share/doc/packages/tiff/html/v3.4beta036.html
/usr/share/doc/packages/tiff/html/v3.5.1.html
/usr/share/doc/packages/tiff/html/v3.5.2.html
/usr/share/doc/packages/tiff/html/v3.5.3.html
/usr/share/doc/packages/tiff/html/v3.5.4.html
/usr/share/doc/packages/tiff/html/v3.5.5.html
/usr/share/doc/packages/tiff/html/v3.5.6-beta.html
/usr/share/doc/packages/tiff/html/v3.5.7.html
/usr/share/doc/packages/tiff/html/v3.6.0.html
/usr/share/doc/packages/tiff/html/v3.6.1.html
/usr/share/doc/packages/tiff/html/v3.7.0.html
/usr/share/doc/packages/tiff/html/v3.7.0alpha.html
/usr/share/doc/packages/tiff/html/v3.7.0beta.html
/usr/share/doc/packages/tiff/html/v3.7.0beta2.html
/usr/share/doc/packages/tiff/html/v3.7.1.html
/usr/share/doc/packages/tiff/html/v3.7.2.html
/usr/share/doc/packages/tiff/html/v3.7.3.html
/usr/share/doc/packages/tiff/html/v3.7.4.html
/usr/share/doc/packages/tiff/html/v3.8.0.html
/usr/share/doc/packages/tiff/html/v3.8.1.html
/usr/share/doc/packages/tiff/html/v3.8.2.html
/usr/share/doc/packages/tiff/html/v3.9.0beta.html
/usr/share/doc/packages/tiff/html/v3.9.1.html
/usr/share/doc/packages/tiff/html/v3.9.2.html
/usr/share/doc/packages/tiff/html/v4.0.0.html
/usr/share/doc/packages/tiff/html/v4.0.1.html
/usr/share/doc/packages/tiff/html/v4.0.2.html
/usr/share/doc/packages/tiff/html/v4.0.3.html
/usr/share/doc/packages/tiff/html/v4.0.4.html
/usr/share/doc/packages/tiff/html/v4.0.4beta.html
/usr/share/doc/packages/tiff/html/v4.0.5.html
/usr/share/doc/packages/tiff/html/v4.0.6.html
/usr/share/doc/packages/tiff/html/v4.0.7.html
/usr/share/man/man1/bmp2tiff.1.gz
/usr/share/man/man1/fax2ps.1.gz
/usr/share/man/man1/fax2tiff.1.gz
/usr/share/man/man1/gif2tiff.1.gz
/usr/share/man/man1/pal2rgb.1.gz
/usr/share/man/man1/ppm2tiff.1.gz
/usr/share/man/man1/ras2tiff.1.gz
/usr/share/man/man1/raw2tiff.1.gz
/usr/share/man/man1/rgb2ycbcr.1.gz
/usr/share/man/man1/thumbnail.1.gz
/usr/share/man/man1/tiff2bw.1.gz
/usr/share/man/man1/tiff2pdf.1.gz
/usr/share/man/man1/tiff2ps.1.gz
/usr/share/man/man1/tiff2rgba.1.gz
/usr/share/man/man1/tiffcmp.1.gz
/usr/share/man/man1/tiffcp.1.gz
/usr/share/man/man1/tiffcrop.1.gz
/usr/share/man/man1/tiffdither.1.gz
/usr/share/man/man1/tiffdump.1.gz
/usr/share/man/man1/tiffgt.1.gz
/usr/share/man/man1/tiffinfo.1.gz
/usr/share/man/man1/tiffmedian.1.gz
/usr/share/man/man1/tiffset.1.gz
/usr/share/man/man1/tiffsplit.1.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Dec 16 23:27:58 2017