laag-libtiff 4.0.9.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.gitignore +57 -0
- data/LICENSE.txt +21 -0
- data/README.org +34 -0
- data/ext/laag/libtiff/extconf.rb +13 -0
- data/laag-libtiff.gemspec +20 -0
- data/lib/laag/libtiff.rb +29 -0
- data/vendor/gitlab.com/libtiff/libtiff/.appveyor.yml +109 -0
- data/vendor/gitlab.com/libtiff/libtiff/.cvsignore +4 -0
- data/vendor/gitlab.com/libtiff/libtiff/.travis.yml +34 -0
- data/vendor/gitlab.com/libtiff/libtiff/CMakeLists.txt +764 -0
- data/vendor/gitlab.com/libtiff/libtiff/COMMITTERS +19 -0
- data/vendor/gitlab.com/libtiff/libtiff/COPYRIGHT +21 -0
- data/vendor/gitlab.com/libtiff/libtiff/ChangeLog +8073 -0
- data/vendor/gitlab.com/libtiff/libtiff/HOWTO-RELEASE +119 -0
- data/vendor/gitlab.com/libtiff/libtiff/HOWTO-SECURITY-RELEASE +19 -0
- data/vendor/gitlab.com/libtiff/libtiff/Makefile.am +91 -0
- data/vendor/gitlab.com/libtiff/libtiff/Makefile.in +995 -0
- data/vendor/gitlab.com/libtiff/libtiff/Makefile.vc +58 -0
- data/vendor/gitlab.com/libtiff/libtiff/README +61 -0
- data/vendor/gitlab.com/libtiff/libtiff/README.vms +12 -0
- data/vendor/gitlab.com/libtiff/libtiff/RELEASE-DATE +1 -0
- data/vendor/gitlab.com/libtiff/libtiff/SConstruct +171 -0
- data/vendor/gitlab.com/libtiff/libtiff/TODO +12 -0
- data/vendor/gitlab.com/libtiff/libtiff/VERSION +1 -0
- data/vendor/gitlab.com/libtiff/libtiff/aclocal.m4 +1194 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/html/man/bmp2tiff.1.html +121 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/html/man/gif2tiff.1.html +141 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/html/man/ras2tiff.1.html +139 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/html/man/sgi2tiff.1.html +147 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/html/man/tiffsv.1.html +207 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/man/bmp2tiff.1 +85 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/man/gif2tiff.1 +81 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/man/ras2tiff.1 +96 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/man/sgi2tiff.1 +93 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/man/tiffsv.1 +142 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/tools/bmp2tiff.c +937 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/tools/gif2tiff.c +591 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/tools/ras2tiff.c +338 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/tools/rasterfile.h +44 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/tools/sgi2tiff.c +337 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/tools/sgisv.c +318 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/tools/ycbcr.c +168 -0
- data/vendor/gitlab.com/libtiff/libtiff/autogen.sh +8 -0
- data/vendor/gitlab.com/libtiff/libtiff/build/.cvsignore +1 -0
- data/vendor/gitlab.com/libtiff/libtiff/build/CMakeLists.txt +25 -0
- data/vendor/gitlab.com/libtiff/libtiff/build/Makefile.am +32 -0
- data/vendor/gitlab.com/libtiff/libtiff/build/Makefile.in +680 -0
- data/vendor/gitlab.com/libtiff/libtiff/build/README +3 -0
- data/vendor/gitlab.com/libtiff/libtiff/build/travis-ci +108 -0
- data/vendor/gitlab.com/libtiff/libtiff/commit +233 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/compile +347 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/config.guess +1526 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/config.sub +1658 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/depcomp +791 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/install-sh +507 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/ltmain.sh +11156 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/missing +215 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/mkinstalldirs +161 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/test-driver +127 -0
- data/vendor/gitlab.com/libtiff/libtiff/configure +23612 -0
- data/vendor/gitlab.com/libtiff/libtiff/configure.ac +1112 -0
- data/vendor/gitlab.com/libtiff/libtiff/configure.com +1357 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/CMakeLists.txt +35 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/Makefile.am +31 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/Makefile.in +679 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/README +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/.cvsignore +5 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/CMakeLists.txt +34 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/Makefile.am +39 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/Makefile.in +652 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/Makefile.vc +28 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/README +142 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/addtiffo.c +181 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/tif_overview.c +916 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/tif_ovrcache.c +344 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/tif_ovrcache.h +103 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/.cvsignore +8 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/CMakeLists.txt +43 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/Makefile.am +46 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/Makefile.in +798 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/README +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/tiff-bi.c +91 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/tiff-grayscale.c +147 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/tiff-palette.c +284 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/tiff-rgb.c +201 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/xtiff/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/xtiff/CMakeLists.txt +29 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/xtiff/Makefile.am +47 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/xtiff/Makefile.in +516 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/xtiff/README +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/xtiff/patchlevel.h +8 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/xtiff/xtiff.c +1290 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/xtiff/xtifficon.h +21 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/iptcutil/.cvsignore +5 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/iptcutil/CMakeLists.txt +35 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/iptcutil/Makefile.am +40 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/iptcutil/Makefile.in +650 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/iptcutil/README +25 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/iptcutil/iptcutil.c +954 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/iptcutil/test.iptc +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/iptcutil/test.txt +32 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/mfs/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/mfs/CMakeLists.txt +27 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/mfs/Makefile.am +29 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/mfs/Makefile.in +499 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/mfs/README +37 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/mfs/mfs_file.c +586 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/CMakeLists.txt +30 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/Makefile.am +32 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/Makefile.in +502 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/README +90 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/tif_imageiter.c +525 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/tif_imageiter.h +64 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/tif_pdsdirread.c +1131 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/tif_pdsdirwrite.c +971 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/ras/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/ras/CMakeLists.txt +28 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/ras/Makefile.am +30 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/ras/Makefile.in +500 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/ras/README +10 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/ras/ras2tif.c +254 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/ras/tif2ras.c +344 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/stream/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/stream/CMakeLists.txt +28 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/stream/Makefile.am +30 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/stream/Makefile.in +500 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/stream/README +30 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/stream/tiffstream.cpp +238 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/stream/tiffstream.h +70 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/CMakeLists.txt +32 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/Makefile.am +33 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/Makefile.in +503 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/README +132 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/listtif.c +39 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/maketif.c +77 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/xtif_dir.c +350 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/xtiffio.h +59 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/xtiffiop.h +72 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/CMakeLists.txt +30 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/Makefile.am +32 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/Makefile.in +502 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/Makefile.w95 +134 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/README.Tiffile +31 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/README.tiff2dib +51 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/Tiffile.cpp +449 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/tiff2dib.c +379 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/.cvsignore +5 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/BigTIFFProposal.html +99 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/CMakeLists.txt +87 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/Makefile.am +96 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/Makefile.in +798 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/TIFFTechNote2.html +707 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/addingtags.html +292 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/bigtiffdesign.html +80 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/bigtiffpr.html +77 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/bigtiffpr_images/esri.png +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/bigtiffpr_images/leica.png +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/bigtiffpr_images/safe.png +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/bigtiffpr_images/weogeo.png +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/bugs.html +61 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/build.html +737 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/contrib.html +209 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/document.html +52 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images.html +41 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/CMakeLists.txt +46 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/Makefile.am +49 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/Makefile.in +572 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/back.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/bali.jpg +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/cat.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/cover.jpg +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/cramps.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/dave.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/info.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/jello.jpg +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/jim.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/note.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/oxford.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/quad.jpg +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/ring.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/smallliz.jpg +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/strike.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/warning.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/index.html +122 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/internals.html +572 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/intro.html +68 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/libtiff.html +747 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/CMakeLists.txt +108 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/HtmlDoc.cmake +50 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/Makefile.am +122 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/Makefile.in +642 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFClose.3tiff.html +87 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFDataWidth.3tiff.html +98 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFError.3tiff.html +106 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFFieldDataType.3tiff.html +89 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFFieldName.3tiff.html +86 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFFieldPassCount.3tiff.html +98 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFFieldReadCount.3tiff.html +101 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFFieldTag.3tiff.html +88 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFFieldWriteCount.3tiff.html +108 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFFlush.3tiff.html +113 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFGetField.3tiff.html +1969 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFOpen.3tiff.html +421 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFPrintDirectory.3tiff.html +225 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFRGBAImage.3tiff.html +319 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadDirectory.3tiff.html +218 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadEncodedStrip.3tiff.html +133 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadEncodedTile.3tiff.html +130 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadRGBAImage.3tiff.html +301 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadRGBAStrip.3tiff.html +208 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadRGBATile.3tiff.html +261 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadRawStrip.3tiff.html +109 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadRawTile.3tiff.html +111 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadScanline.3tiff.html +157 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadTile.3tiff.html +133 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFSetDirectory.3tiff.html +122 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFSetField.3tiff.html +1865 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFWarning.3tiff.html +108 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFWriteDirectory.3tiff.html +176 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFWriteEncodedStrip.3tiff.html +153 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFWriteEncodedTile.3tiff.html +147 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFWriteRawStrip.3tiff.html +144 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFWriteRawTile.3tiff.html +128 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFWriteScanline.3tiff.html +206 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFWriteTile.3tiff.html +115 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFbuffer.3tiff.html +116 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFcodec.3tiff.html +116 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFcolor.3tiff.html +975 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFmemory.3tiff.html +110 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFquery.3tiff.html +148 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFsize.3tiff.html +95 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFstrip.3tiff.html +129 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFswab.3tiff.html +110 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFtile.3tiff.html +141 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/fax2ps.1.html +252 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/fax2tiff.1.html +607 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/index.html +64 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/libtiff.3tiff.html +1150 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/pal2rgb.1.html +189 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/ppm2tiff.1.html +141 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/raw2tiff.1.html +510 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/rgb2ycbcr.1.html +155 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/thumbnail.1.html +148 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiff2bw.1.html +161 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiff2pdf.1.html +609 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiff2ps.1.html +639 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiff2rgba.1.html +162 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffcmp.1.html +156 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffcp.1.html +569 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffcrop.1.html +684 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffdither.1.html +196 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffdump.1.html +145 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffgt.1.html +551 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffinfo.1.html +196 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffmedian.1.html +183 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffset.1.html +176 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffsplit.1.html +102 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/misc.html +117 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/support.html +655 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/tools.html +137 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta007.html +112 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta016.html +122 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta018.html +84 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta024.html +139 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta028.html +146 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta029.html +86 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta031.html +94 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta032.html +90 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta033.html +82 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta034.html +68 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta035.html +63 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta036.html +117 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.5.1.html +75 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.5.2.html +108 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.5.3.html +132 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.5.4.html +88 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.5.5.html +155 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.5.6-beta.html +185 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.5.7.html +259 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.6.0.html +434 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.6.1.html +199 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.7.0.html +144 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.7.0alpha.html +249 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.7.0beta.html +162 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.7.0beta2.html +131 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.7.1.html +233 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.7.2.html +222 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.7.3.html +230 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.7.4.html +133 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.8.0.html +199 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.8.1.html +217 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.8.2.html +137 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.9.0.html +261 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.9.0beta.html +304 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.9.1.html +115 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.9.2.html +122 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.9.3.html +160 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.9.4.html +125 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.9.5.html +270 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.0.html +269 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.1.html +113 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.2.html +118 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.3.html +125 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.4.html +274 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.4beta.html +291 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.5.html +148 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.6.html +139 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.7.html +411 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.8.html +445 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.9.html +373 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff-4.pc.in +11 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/.cvsignore +22 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/CMakeLists.txt +165 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/Makefile.am +154 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/Makefile.in +966 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/Makefile.lcc +129 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/Makefile.vc +102 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/SConstruct +73 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/libtiff.def +168 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/libtiff.map +4 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/libtiffxx.map +4 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/mkg3states.c +454 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/mkspans.c +82 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/t4.h +292 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_aux.c +376 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_close.c +140 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_codec.c +165 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_color.c +309 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_compress.c +304 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_config.h-vms +46 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_config.h.cmake.in +261 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_config.h.in +410 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_config.vc.h +137 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_config.wince.h +71 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_dir.c +1767 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_dir.h +309 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_dirinfo.c +1070 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_dirread.c +5803 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_dirwrite.c +3024 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_dumpmode.c +143 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_error.c +88 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_extension.c +118 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_fax3.c +1648 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_fax3.h +540 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_fax3sm.c +1260 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_flush.c +118 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_getimage.c +3048 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_jbig.c +214 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_jpeg.c +2601 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_jpeg_12.c +69 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_luv.c +1765 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_lzma.c +495 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_lzw.c +1218 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_next.c +189 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_ojpeg.c +2563 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_open.c +725 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_packbits.c +311 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_pixarlog.c +1485 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_predict.c +881 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_predict.h +79 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_print.c +722 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_read.c +1572 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_stream.cxx +430 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_strip.c +389 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_swab.c +312 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_thunder.c +208 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_tile.c +322 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_unix.c +386 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_version.c +40 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_vms.c +611 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_warning.c +89 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_win32.c +476 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_wince.c +293 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_write.c +834 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_zip.c +476 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiff.h +681 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffconf.h-vms +99 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffconf.h.cmake.in +130 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffconf.h.in +127 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffconf.vc.h +161 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffconf.wince.h +121 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffio.h +560 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffio.hxx +49 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffiop.h +445 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffvers.h +9 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffvers.h.in +9 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/uvcode.h +180 -0
- data/vendor/gitlab.com/libtiff/libtiff/m4/acinclude.m4 +851 -0
- data/vendor/gitlab.com/libtiff/libtiff/m4/ice_find_athena.m4 +187 -0
- data/vendor/gitlab.com/libtiff/libtiff/m4/libtool.m4 +8388 -0
- data/vendor/gitlab.com/libtiff/libtiff/m4/ltoptions.m4 +437 -0
- data/vendor/gitlab.com/libtiff/libtiff/m4/ltsugar.m4 +124 -0
- data/vendor/gitlab.com/libtiff/libtiff/m4/ltversion.m4 +23 -0
- data/vendor/gitlab.com/libtiff/libtiff/m4/lt~obsolete.m4 +99 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/.cvsignore +3 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/CMakeLists.txt +97 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/Makefile.am +94 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/Makefile.in +684 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFClose.3tiff +53 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFDataWidth.3tiff +74 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFError.3tiff +69 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFFieldDataType.3tiff +53 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFFieldName.3tiff +52 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFFieldPassCount.3tiff +73 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFFieldReadCount.3tiff +77 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFFieldTag.3tiff +56 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFFieldWriteCount.3tiff +88 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFFlush.3tiff +64 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFGetField.3tiff +229 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFOpen.3tiff +279 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFPrintDirectory.3tiff +70 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFRGBAImage.3tiff +286 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadDirectory.3tiff +164 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadEncodedStrip.3tiff +78 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadEncodedTile.3tiff +76 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadRGBAImage.3tiff +218 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadRGBAStrip.3tiff +170 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadRGBATile.3tiff +171 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadRawStrip.3tiff +64 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadRawTile.3tiff +65 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadScanline.3tiff +94 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadTile.3tiff +84 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFSetDirectory.3tiff +79 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFSetField.3tiff +217 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFWarning.3tiff +70 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFWriteDirectory.3tiff +138 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFWriteEncodedStrip.3tiff +102 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFWriteEncodedTile.3tiff +96 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFWriteRawStrip.3tiff +96 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFWriteRawTile.3tiff +84 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFWriteScanline.3tiff +154 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFWriteTile.3tiff +77 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFbuffer.3tiff +77 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFcodec.3tiff +82 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFcolor.3tiff +268 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFmemory.3tiff +90 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFquery.3tiff +142 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFsize.3tiff +59 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFstrip.3tiff +99 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFswab.3tiff +80 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFtile.3tiff +131 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/fax2ps.1 +159 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/fax2tiff.1 +286 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/libtiff.3tiff +545 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/pal2rgb.1 +111 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/ppm2tiff.1 +105 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/raw2tiff.1 +196 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/rgb2ycbcr.1 +99 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/thumbnail.1 +90 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiff2bw.1 +94 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiff2pdf.1 +254 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiff2ps.1 +294 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiff2rgba.1 +97 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffcmp.1 +87 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffcp.1 +317 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffcrop.1 +571 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffdither.1 +135 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffdump.1 +81 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffgt.1 +245 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffinfo.1 +88 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffmedian.1 +112 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffset.1 +99 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffsplit.1 +69 -0
- data/vendor/gitlab.com/libtiff/libtiff/nmake.opt +229 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/.cvsignore +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/CMakeLists.txt +60 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/Makefile.am +35 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/Makefile.in +656 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/Makefile.vc +44 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/dummy.c +12 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/getopt.c +125 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/lfind.c +62 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/libport.h +60 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/snprintf.c +38 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/strcasecmp.c +51 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/strtoul.c +109 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/strtoull.c +116 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/.cvsignore +12 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/CMakeLists.txt +382 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/Makefile.am +334 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/Makefile.in +1987 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/TiffSplitTest.cmake +34 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/TiffTest.cmake +63 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/TiffTestCommon.cmake +108 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/ascii_tag.c +177 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/check_tag.c +91 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/common.sh +122 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/custom_dir.c +247 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/README.txt +29 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/logluv-3c-16b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/minisblack-1c-16b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/minisblack-1c-8b.pgm +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/minisblack-1c-8b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/minisblack-2c-8b-alpha.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/miniswhite-1c-1b.pbm +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/miniswhite-1c-1b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/palette-1c-1b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/palette-1c-4b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/palette-1c-8b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/quad-lzw-compat.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/quad-tile.jpg.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/rgb-3c-16b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/rgb-3c-8b.ppm +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/rgb-3c-8b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/long_tag.c +156 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/ppm2tiff_pbm.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/ppm2tiff_pgm.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/ppm2tiff_ppm.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/raw_decode.c +304 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/rewrite_tag.c +344 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/short_tag.c +205 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/strip.c +290 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/strip_rw.c +157 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/test_arrays.c +829 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/test_arrays.h +63 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2bw-palette-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2bw-quad-lzw-compat.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2bw-rgb-3c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2pdf.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2ps-EPS1.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2ps-PS1.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2ps-PS2.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2ps-PS3.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-logluv-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-minisblack-1c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-minisblack-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-minisblack-2c-8b-alpha.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-miniswhite-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-palette-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-palette-1c-4b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-palette-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-quad-tile.jpg.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-rgb-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-rgb-3c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-g3-1d-fill.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-g3-1d.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-g3-2d-fill.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-g3-2d.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-g3.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-g4.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-logluv.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-lzw-compat.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-split-join.sh +16 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-split.sh +13 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-thumbnail.sh +10 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-logluv-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-minisblack-1c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-minisblack-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-minisblack-2c-8b-alpha.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-miniswhite-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-palette-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-palette-1c-4b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-palette-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-quad-tile.jpg.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-rgb-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-rgb-3c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-logluv-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-minisblack-1c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-minisblack-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-minisblack-2c-8b-alpha.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-miniswhite-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-palette-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-palette-1c-4b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-palette-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-quad-tile.jpg.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-rgb-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-rgb-3c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-logluv-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-minisblack-1c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-minisblack-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-minisblack-2c-8b-alpha.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-miniswhite-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-palette-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-palette-1c-4b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-palette-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-quad-tile.jpg.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-rgb-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-rgb-3c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-logluv-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-minisblack-1c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-minisblack-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-minisblack-2c-8b-alpha.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-miniswhite-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-palette-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-palette-1c-4b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-palette-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-quad-tile.jpg.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-rgb-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-rgb-3c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffdump.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffinfo.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tifftest.h +42 -0
- data/vendor/gitlab.com/libtiff/libtiff/tiff.spec +68 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/.cvsignore +27 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/CMakeLists.txt +125 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/Makefile.am +138 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/Makefile.in +955 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/Makefile.lcc +133 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/Makefile.vc +52 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/fax2ps.c +463 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/fax2tiff.c +491 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/pal2rgb.c +438 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/ppm2tiff.c +397 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/raw2tiff.c +690 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/rgb2ycbcr.c +397 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/thumbnail.c +691 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiff2bw.c +501 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiff2pdf.c +5594 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiff2ps.c +3106 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiff2rgba.c +569 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffcmp.c +659 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffcp.c +1913 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffcrop.c +9231 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffdither.c +347 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffdump.c +889 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffgt.c +486 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffinfo.c +488 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffinfoce.c +472 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffmedian.c +918 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffset.c +356 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffsplit.c +305 -0
- metadata +692 -0
|
@@ -0,0 +1,411 @@
|
|
|
1
|
+
<HTML>
|
|
2
|
+
<HEAD>
|
|
3
|
+
<TITLE>
|
|
4
|
+
Changes in TIFF v4.0.7
|
|
5
|
+
</TITLE>
|
|
6
|
+
</HEAD>
|
|
7
|
+
|
|
8
|
+
<BODY BGCOLOR=white>
|
|
9
|
+
<FONT FACE="Helvetica, Arial, Sans">
|
|
10
|
+
|
|
11
|
+
<BASEFONT SIZE=4>
|
|
12
|
+
<B><FONT SIZE=+3>T</FONT>IFF <FONT SIZE=+2>C</FONT>HANGE <FONT SIZE=+2>I</FONT>NFORMATION</B>
|
|
13
|
+
<BASEFONT SIZE=3>
|
|
14
|
+
|
|
15
|
+
<UL>
|
|
16
|
+
<HR SIZE=4 WIDTH=65% ALIGN=left>
|
|
17
|
+
<B>Current Version</B>: v4.0.7<BR>
|
|
18
|
+
<B>Previous Version</B>: <A HREF=v4.0.6.html>v4.0.6</a><BR>
|
|
19
|
+
<B>Master FTP Site</B>: <A HREF="ftp://download.osgeo.org/libtiff">
|
|
20
|
+
download.osgeo.org</a>, directory pub/libtiff</A><BR>
|
|
21
|
+
<B>Master HTTP Site #1</B>: <A HREF="http://www.simplesystems.org/libtiff/">
|
|
22
|
+
http://www.simplesystems.org/libtiff/</a><BR>
|
|
23
|
+
<B>Master HTTP Site #2</B>: <A HREF="http://libtiff.maptools.org/">
|
|
24
|
+
http://libtiff.maptools.org/</a>
|
|
25
|
+
<HR SIZE=4 WIDTH=65% ALIGN=left>
|
|
26
|
+
</UL>
|
|
27
|
+
|
|
28
|
+
<P>
|
|
29
|
+
This document describes the changes made to the software between the
|
|
30
|
+
<I>previous</I> and <I>current</I> versions (see above). If you don't
|
|
31
|
+
find something listed here, then it was not done in this timeframe, or
|
|
32
|
+
it was not considered important enough to be mentioned. The following
|
|
33
|
+
information is located here:
|
|
34
|
+
<UL>
|
|
35
|
+
<LI><A HREF="#highlights">Major Changes</A>
|
|
36
|
+
<LI><A HREF="#configure">Changes in the software configuration</A>
|
|
37
|
+
<LI><A HREF="#libtiff">Changes in libtiff</A>
|
|
38
|
+
<LI><A HREF="#tools">Changes in the tools</A>
|
|
39
|
+
<LI><A HREF="#contrib">Changes in the contrib area</A>
|
|
40
|
+
</UL>
|
|
41
|
+
<p>
|
|
42
|
+
<P><HR WIDTH=65% ALIGN=left>
|
|
43
|
+
|
|
44
|
+
<!--------------------------------------------------------------------------->
|
|
45
|
+
|
|
46
|
+
<A NAME="highlights"><B><FONT SIZE=+3>M</FONT>AJOR CHANGES:</B></A>
|
|
47
|
+
|
|
48
|
+
<UL>
|
|
49
|
+
|
|
50
|
+
<LI> The libtiff tools bmp2tiff, gif2tiff, ras2tiff, sgi2tiff,
|
|
51
|
+
sgisv, and ycbcr are completely removed from the distribution.
|
|
52
|
+
These tools were written in the late 1980s and early 1990s for
|
|
53
|
+
test and demonstration purposes. In some cases the tools were
|
|
54
|
+
never updated to support updates to the file format, or the
|
|
55
|
+
file formats are now rarely used. In all cases these tools
|
|
56
|
+
increased the libtiff security and maintenance exposure beyond
|
|
57
|
+
the value offered by the tool.
|
|
58
|
+
|
|
59
|
+
</UL>
|
|
60
|
+
|
|
61
|
+
|
|
62
|
+
<P><HR WIDTH=65% ALIGN=left>
|
|
63
|
+
<!--------------------------------------------------------------------------->
|
|
64
|
+
|
|
65
|
+
<A NAME="configure"><B><FONT SIZE=+3>C</FONT>HANGES IN THE SOFTWARE CONFIGURATION:</B></A>
|
|
66
|
+
|
|
67
|
+
<UL>
|
|
68
|
+
|
|
69
|
+
<LI> None
|
|
70
|
+
|
|
71
|
+
</UL>
|
|
72
|
+
|
|
73
|
+
<P><HR WIDTH=65% ALIGN=left>
|
|
74
|
+
|
|
75
|
+
<!--------------------------------------------------------------------------->
|
|
76
|
+
|
|
77
|
+
<A NAME="libtiff"><B><FONT SIZE=+3>C</FONT>HANGES IN LIBTIFF:</B></A>
|
|
78
|
+
|
|
79
|
+
<UL>
|
|
80
|
+
|
|
81
|
+
<LI> libtiff/tif_dirread.c: in TIFFFetchNormalTag(), do not
|
|
82
|
+
dereference NULL pointer when values of tags with
|
|
83
|
+
TIFF_SETGET_C16_ASCII / TIFF_SETGET_C32_ASCII access are
|
|
84
|
+
0-byte arrays. Fixes
|
|
85
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2593 (regression
|
|
86
|
+
introduced by previous fix done on 2016-11-11 for
|
|
87
|
+
CVE-2016-9297). Reported by Henri Salo. Assigned as
|
|
88
|
+
CVE-2016-9448
|
|
89
|
+
|
|
90
|
+
<LI> libtiff/tif_aux.c: fix crash in TIFFVGetFieldDefaulted() when
|
|
91
|
+
requesting Predictor tag and that the zip/lzw codec is not
|
|
92
|
+
configured. Fixes
|
|
93
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2591
|
|
94
|
+
|
|
95
|
+
<LI> libtiff/tif_dirread.c: in TIFFFetchNormalTag(), make sure
|
|
96
|
+
that values of tags with TIFF_SETGET_C16_ASCII /
|
|
97
|
+
TIFF_SETGET_C32_ASCII access are null terminated, to avoid
|
|
98
|
+
potential read outside buffer in _TIFFPrintField(). Fixes
|
|
99
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2590
|
|
100
|
+
|
|
101
|
+
<LI> libtiff/tif_dirread.c: reject images with OJPEG compression
|
|
102
|
+
that have no TileOffsets/StripOffsets tag, when OJPEG
|
|
103
|
+
compression is disabled. Prevent null pointer dereference in
|
|
104
|
+
TIFFReadRawStrip1() and other functions that expect
|
|
105
|
+
td_stripbytecount to be non NULL. Fixes
|
|
106
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2585
|
|
107
|
+
|
|
108
|
+
<LI> libtiff/tif_strip.c: make TIFFNumberOfStrips() return the
|
|
109
|
+
td->td_nstrips value when it is non-zero, instead of
|
|
110
|
+
recomputing it. This is needed in TIFF_STRIPCHOP mode where
|
|
111
|
+
td_nstrips is modified. Fixes a read outsize of array in
|
|
112
|
+
tiffsplit (or other utilities using TIFFNumberOfStrips()).
|
|
113
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2587
|
|
114
|
+
(CVE-2016-9273)
|
|
115
|
+
|
|
116
|
+
<LI> libtiff/tif_predict.h, libtiff/tif_predict.c: Replace
|
|
117
|
+
assertions by runtime checks to avoid assertions in debug
|
|
118
|
+
mode, or buffer overflows in release mode. Can happen when
|
|
119
|
+
dealing with unusual tile size like YCbCr with
|
|
120
|
+
subsampling. Reported as MSVR 35105 by Axel Souchet & Vishal
|
|
121
|
+
Chauhan from the MSRC Vulnerabilities & Mitigations
|
|
122
|
+
|
|
123
|
+
<LI> libtiff/tif_dir.c: discard values of SMinSampleValue and
|
|
124
|
+
SMaxSampleValue when they have been read and the value of
|
|
125
|
+
SamplesPerPixel is changed afterwards (like when reading a
|
|
126
|
+
OJPEG compressed image with a missing SamplesPerPixel tag, and
|
|
127
|
+
whose photometric is RGB or YCbCr, forcing SamplesPerPixel
|
|
128
|
+
being 3). Otherwise when rewriting the directory (for example
|
|
129
|
+
with tiffset, we will expect 3 values whereas the array had
|
|
130
|
+
been allocated with just one), thus causing a out of bound
|
|
131
|
+
read access. Fixes
|
|
132
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2500
|
|
133
|
+
(CVE-2014-8127, duplicate: CVE-2016-3658)
|
|
134
|
+
|
|
135
|
+
<LI> libtiff/tif_dirwrite.c: avoid null pointer dereference on
|
|
136
|
+
td_stripoffset when writing directory, if FIELD_STRIPOFFSETS
|
|
137
|
+
was artificially set for a hack case in OJPEG case. Fixes
|
|
138
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2500
|
|
139
|
+
(CVE-2014-8127, duplicate: CVE-2016-3658)
|
|
140
|
+
|
|
141
|
+
<LI> libtiff/tif_getimage.c (TIFFRGBAImageOK): Reject attempts to
|
|
142
|
+
read floating point images.
|
|
143
|
+
|
|
144
|
+
<LI> libtiff/tif_predict.c (PredictorSetup): Enforce
|
|
145
|
+
bits-per-sample requirements of floating point predictor (3).
|
|
146
|
+
Fixes CVE-2016-3622 "Divide By Zero in the tiff2rgba tool."
|
|
147
|
+
|
|
148
|
+
<LI> libtiff/tif_pixarlog.c: fix out-of-bounds write vulnerabilities
|
|
149
|
+
in heap allocated buffers. Reported as MSVR 35094. Discovered by
|
|
150
|
+
Axel Souchet and Vishal Chauhan from the MSRC Vulnerabilities &
|
|
151
|
+
Mitigations team.
|
|
152
|
+
|
|
153
|
+
<LI> libtiff/tif_write.c: fix issue in error code path of
|
|
154
|
+
TIFFFlushData1() that didn't reset the tif_rawcc and tif_rawcp
|
|
155
|
+
members. I'm not completely sure if that could happen in
|
|
156
|
+
practice outside of the odd behaviour of t2p_seekproc() of
|
|
157
|
+
tiff2pdf). The report points that a better fix could be to
|
|
158
|
+
check the return value of TIFFFlushData1() in places where it
|
|
159
|
+
isn't done currently, but it seems this patch is enough.
|
|
160
|
+
Reported as MSVR 35095. Discovered by Axel Souchet & Vishal
|
|
161
|
+
Chauhan & Suha Can from the MSRC Vulnerabilities & Mitigations
|
|
162
|
+
team.
|
|
163
|
+
|
|
164
|
+
<LI> libtiff/tif_pixarlog.c: Fix write buffer overflow in
|
|
165
|
+
PixarLogEncode if more input samples are provided than
|
|
166
|
+
expected by PixarLogSetupEncode. Idea based on
|
|
167
|
+
libtiff-CVE-2016-3990.patch from
|
|
168
|
+
libtiff-4.0.3-25.el7_2.src.rpm by Nikola Forro, but with
|
|
169
|
+
different and simpler check. (bugzilla #2544)
|
|
170
|
+
|
|
171
|
+
<LI> libtiff/tif_read.c: Fix out-of-bounds read on memory-mapped
|
|
172
|
+
files in TIFFReadRawStrip1() and TIFFReadRawTile1() when
|
|
173
|
+
stripoffset is beyond tmsize_t max value (reported by Mathias
|
|
174
|
+
Svensson)
|
|
175
|
+
|
|
176
|
+
<LI> libtiff/tif_read.c: make TIFFReadEncodedStrip() and
|
|
177
|
+
TIFFReadEncodedTile() directly use user provided buffer when
|
|
178
|
+
no compression (and other conditions) to save a memcpy()
|
|
179
|
+
|
|
180
|
+
<LI> libtiff/tif_write.c: make TIFFWriteEncodedStrip() and
|
|
181
|
+
TIFFWriteEncodedTile() directly use user provided buffer when
|
|
182
|
+
no compression to save a memcpy().
|
|
183
|
+
|
|
184
|
+
<LI> libtiff/tif_luv.c: validate that for COMPRESSION_SGILOG and
|
|
185
|
+
PHOTOMETRIC_LOGL, there is only one sample per pixel. Avoid
|
|
186
|
+
potential invalid memory write on corrupted/unexpected images
|
|
187
|
+
when using the TIFFRGBAImageBegin() interface (reported by
|
|
188
|
+
Clay Wood)
|
|
189
|
+
|
|
190
|
+
<LI> libtiff/tif_pixarlog.c: fix potential buffer write overrun in
|
|
191
|
+
PixarLogDecode() on corrupted/unexpected images (reported by
|
|
192
|
+
Mathias Svensson) (CVE-2016-5875)
|
|
193
|
+
|
|
194
|
+
<LI> libtiff/libtiff.def: Added _TIFFMultiply32 and
|
|
195
|
+
_TIFFMultiply64 to libtiff.def
|
|
196
|
+
|
|
197
|
+
<LI> libtiff/tif_config.vc.h (HAVE_SNPRINTF): Add a '1' to the
|
|
198
|
+
HAVE_SNPRINTF definition.
|
|
199
|
+
|
|
200
|
+
<LI> libtiff/tif_config.vc.h (HAVE_SNPRINTF): Applied patch by
|
|
201
|
+
Edward Lam to define HAVE_SNPRINTF for Visual Studio 2015.
|
|
202
|
+
|
|
203
|
+
<LI> libtiff/tif_dirread.c: when compiled with DEFER_STRILE_LOAD,
|
|
204
|
+
fix regression, introduced on 2014-12-23, when reading a
|
|
205
|
+
one-strip file without a StripByteCounts tag. GDAL #6490
|
|
206
|
+
|
|
207
|
+
<LI> libtiff/*: upstream typo fixes (mostly contributed by Kurt
|
|
208
|
+
Schwehr) coming from GDAL internal libtiff
|
|
209
|
+
|
|
210
|
+
<LI> libtiff/tif_fax3.h: make Param member of TIFFFaxTabEnt
|
|
211
|
+
structure a uint16 to reduce size of the binary.
|
|
212
|
+
|
|
213
|
+
<LI> libtiff/tif_read.c, tif_dirread.c: fix indentation issues
|
|
214
|
+
raised by GCC 6 -Wmisleading-indentation
|
|
215
|
+
|
|
216
|
+
<LI> libtiff/tif_pixarlog.c: avoid zlib error messages to pass a
|
|
217
|
+
NULL string to %s formatter, which is undefined behaviour in
|
|
218
|
+
sprintf().
|
|
219
|
+
|
|
220
|
+
<LI> libtiff/tif_next.c: fix potential out-of-bound write in NeXTDecode()
|
|
221
|
+
triggered by http://lcamtuf.coredump.cx/afl/vulns/libtiff5.tif
|
|
222
|
+
(bugzilla #2508)
|
|
223
|
+
|
|
224
|
+
<LI> libtiff/tif_luv.c: fix potential out-of-bound writes in
|
|
225
|
+
decode functions in non debug builds by replacing assert()s by
|
|
226
|
+
regular if checks (bugzilla #2522). Fix potential
|
|
227
|
+
out-of-bound reads in case of short input data.
|
|
228
|
+
|
|
229
|
+
<LI> libtiff/tif_getimage.c: fix out-of-bound reads in
|
|
230
|
+
TIFFRGBAImage interface in case of unsupported values of
|
|
231
|
+
SamplesPerPixel/ExtraSamples for LogLUV / CIELab. Add explicit
|
|
232
|
+
call to TIFFRGBAImageOK() in TIFFRGBAImageBegin(). Fix
|
|
233
|
+
CVE-2015-8665 reported by limingxing and CVE-2015-8683
|
|
234
|
+
reported by zzf of Alibaba.
|
|
235
|
+
|
|
236
|
+
<LI> libtiff/tif_dirread.c: workaround false positive warning of
|
|
237
|
+
Clang Static Analyzer about null pointer dereference in
|
|
238
|
+
TIFFCheckDirOffset().
|
|
239
|
+
|
|
240
|
+
<LI> libtiff/tif_fax3.c: remove dead assignment in
|
|
241
|
+
Fax3PutEOLgdal(). Found by Clang Static Analyzer
|
|
242
|
+
|
|
243
|
+
<LI> libtiff/tif_dirwrite.c: fix truncation to 32 bit of file
|
|
244
|
+
offsets in TIFFLinkDirectory() and TIFFWriteDirectorySec()
|
|
245
|
+
when aligning directory offsets on a even offset (affects
|
|
246
|
+
BigTIFF). This was a regression of the changeset of
|
|
247
|
+
2015-10-19.
|
|
248
|
+
|
|
249
|
+
<LI> libtiff/tif_write.c: TIFFWriteEncodedStrip() and
|
|
250
|
+
TIFFWriteEncodedTile() should return -1 in case of failure of
|
|
251
|
+
tif_encodestrip() as documented
|
|
252
|
+
|
|
253
|
+
<LI> libtiff/tif_dumpmode.c: DumpModeEncode() should return 0 in
|
|
254
|
+
case of failure so that the above mentionned functions detect
|
|
255
|
+
the error.
|
|
256
|
+
|
|
257
|
+
<LI> libtiff/*.c: fix MSVC warnings related to cast shortening and
|
|
258
|
+
assignment within conditional expression
|
|
259
|
+
|
|
260
|
+
<LI> libtiff/*.c: fix clang -Wshorten-64-to-32 warnings
|
|
261
|
+
|
|
262
|
+
<LI> libtiff/tif_dirread.c: prevent reading ColorMap or
|
|
263
|
+
TransferFunction if BitsPerPixel > 24, so as to avoid huge
|
|
264
|
+
memory allocation and file read attempts
|
|
265
|
+
|
|
266
|
+
<LI> libtiff/tif_dirread.c: remove duplicated assignment (reported
|
|
267
|
+
by Clang static analyzer)
|
|
268
|
+
|
|
269
|
+
<LI> libtiff/tif_dir.c, libtiff/tif_dirinfo.c,
|
|
270
|
+
libtiff/tif_compress.c, libtiff/tif_jpeg_12.c: suppress
|
|
271
|
+
warnings about 'no previous declaration/prototype'
|
|
272
|
+
|
|
273
|
+
<LI> libtiff/tiffiop.h, libtiff/tif_dirwrite.c: suffix constants
|
|
274
|
+
by U to fix 'warning: negative integer implicitly converted to
|
|
275
|
+
unsigned type' warning (part of -Wconversion)
|
|
276
|
+
|
|
277
|
+
<LI> libtiff/tif_dir.c, libtiff/tif_dirread.c,
|
|
278
|
+
libtiff/tif_getimage.c, libtiff/tif_print.c: fix -Wshadow
|
|
279
|
+
warnings (only in libtiff/)
|
|
280
|
+
|
|
281
|
+
</UL>
|
|
282
|
+
|
|
283
|
+
<P><HR WIDTH=65% ALIGN=left>
|
|
284
|
+
|
|
285
|
+
<!-------------------------------------------------------------------------->
|
|
286
|
+
|
|
287
|
+
<A NAME="tools"><B><FONT SIZE=+3>C</FONT>HANGES IN THE TOOLS:</B></A>
|
|
288
|
+
|
|
289
|
+
<UL>
|
|
290
|
+
|
|
291
|
+
<LI> tools/Makefile.am: The libtiff tools bmp2tiff, gif2tiff,
|
|
292
|
+
ras2tiff, sgi2tiff, sgisv, and ycbcr are completely removed
|
|
293
|
+
from the distribution. The libtiff tools rgb2ycbcr and
|
|
294
|
+
thumbnail are only built in the build tree for testing. Old
|
|
295
|
+
files are put in new 'archive' subdirectory of the source
|
|
296
|
+
repository, but not in distribution archives. These changes
|
|
297
|
+
are made in order to lessen the maintenance burden.
|
|
298
|
+
|
|
299
|
+
<LI> tools/tiff2pdf.c: avoid undefined behaviour related to
|
|
300
|
+
overlapping of source and destination buffer in memcpy() call
|
|
301
|
+
in t2p_sample_rgbaa_to_rgb() Fixes
|
|
302
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2577
|
|
303
|
+
|
|
304
|
+
<LI> tools/tiff2pdf.c: fix potential integer overflows on 32 bit
|
|
305
|
+
builds in t2p_read_tiff_size() Fixes
|
|
306
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2576
|
|
307
|
+
|
|
308
|
+
<LI> tools/fax2tiff.c: fix segfault when specifying -r without
|
|
309
|
+
argument. Patch by Yuriy M. Kaminskiy. Fixes
|
|
310
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2572
|
|
311
|
+
|
|
312
|
+
<LI> tools/tiffinfo.c: fix out-of-bound read on some tiled images.
|
|
313
|
+
(http://bugzilla.maptools.org/show_bug.cgi?id=2517)
|
|
314
|
+
|
|
315
|
+
<LI> tools/tiffcrop.c: fix multiple uint32 overflows in
|
|
316
|
+
writeBufferToSeparateStrips(), writeBufferToContigTiles() and
|
|
317
|
+
writeBufferToSeparateTiles() that could cause heap buffer
|
|
318
|
+
overflows. Reported by Henri Salo from Nixu Corporation.
|
|
319
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2592
|
|
320
|
+
|
|
321
|
+
<LI> tools/tiffcrop.c: fix out-of-bound read of up to 3 bytes in
|
|
322
|
+
readContigTilesIntoBuffer(). Reported as MSVR 35092 by Axel
|
|
323
|
+
Souchet & Vishal Chauhan from the MSRC Vulnerabilities &
|
|
324
|
+
Mitigations team.
|
|
325
|
+
|
|
326
|
+
<LI> tools/tiff2pdf.c: fix write buffer overflow of 2 bytes on
|
|
327
|
+
JPEG compressed images. Reported by Tyler Bohan of Cisco Talos
|
|
328
|
+
as TALOS-CAN-0187 / CVE-2016-5652. Also prevents writing 2
|
|
329
|
+
extra uninitialized bytes to the file stream.
|
|
330
|
+
|
|
331
|
+
<LI> tools/tiffcp.c: fix out-of-bounds write on tiled images with odd
|
|
332
|
+
tile width vs image width. Reported as MSVR 35103
|
|
333
|
+
by Axel Souchet and Vishal Chauhan from the MSRC Vulnerabilities &
|
|
334
|
+
Mitigations team.
|
|
335
|
+
|
|
336
|
+
<LI> tools/tiff2pdf.c: fix read -largely- outsize of buffer in
|
|
337
|
+
t2p_readwrite_pdf_image_tile(), causing crash, when reading a
|
|
338
|
+
JPEG compressed image with TIFFTAG_JPEGTABLES length being
|
|
339
|
+
one. Reported as MSVR 35101 by Axel Souchet and Vishal
|
|
340
|
+
Chauhan from the MSRC Vulnerabilities & Mitigations team.
|
|
341
|
+
|
|
342
|
+
<LI> tools/tiffcp.c: fix read of undefined variable in case of
|
|
343
|
+
missing required tags. Found on test case of MSVR 35100.
|
|
344
|
+
|
|
345
|
+
<LI> tools/tiffcrop.c: fix read of undefined buffer in
|
|
346
|
+
readContigStripsIntoBuffer() due to uint16 overflow. Probably
|
|
347
|
+
not a security issue but I can be wrong. Reported as MSVR
|
|
348
|
+
35100 by Axel Souchet from the MSRC Vulnerabilities &
|
|
349
|
+
Mitigations team.
|
|
350
|
+
|
|
351
|
+
<LI> tools/tiffcrop.c: fix various out-of-bounds write
|
|
352
|
+
vulnerabilities in heap or stack allocated buffers. Reported
|
|
353
|
+
as MSVR 35093, MSVR 35096 and MSVR 35097. Discovered by Axel
|
|
354
|
+
Souchet and Vishal Chauhan from the MSRC Vulnerabilities &
|
|
355
|
+
Mitigations team.
|
|
356
|
+
|
|
357
|
+
<LI> tools/tiff2pdf.c: fix out-of-bounds write vulnerabilities in
|
|
358
|
+
heap allocate buffer in t2p_process_jpeg_strip(). Reported as
|
|
359
|
+
MSVR 35098. Discovered by Axel Souchet and Vishal Chauhan from
|
|
360
|
+
the MSRC Vulnerabilities & Mitigations team.
|
|
361
|
+
|
|
362
|
+
<LI> tools/tiff2bw.c: fix weight computation that could result of
|
|
363
|
+
color value overflow (no security implication). Fix bugzilla
|
|
364
|
+
#2550. Patch by Frank Freudenberg.
|
|
365
|
+
|
|
366
|
+
<LI> tools/rgb2ycbcr.c: validate values of -v and -h parameters to
|
|
367
|
+
avoid potential divide by zero. Fixes CVE-2016-3623 (bugzilla #2569)
|
|
368
|
+
|
|
369
|
+
<LI> tools/tiffcrop.c: Fix out-of-bounds write in loadImage().
|
|
370
|
+
From patch libtiff-CVE-2016-3991.patch from
|
|
371
|
+
libtiff-4.0.3-25.el7_2.src.rpm by Nikola Forro (bugzilla
|
|
372
|
+
#2543)
|
|
373
|
+
|
|
374
|
+
<LI> tools/tiff2rgba.c: Fix integer overflow in size of allocated
|
|
375
|
+
buffer, when -b mode is enabled, that could result in
|
|
376
|
+
out-of-bounds write. Based initially on patch
|
|
377
|
+
tiff-CVE-2016-3945.patch from libtiff-4.0.3-25.el7_2.src.rpm
|
|
378
|
+
by Nikola Forro, with correction for invalid tests that
|
|
379
|
+
rejected valid files. (bugzilla #2545)
|
|
380
|
+
|
|
381
|
+
<LI> tools/tiffcrop.c: Avoid access outside of stack allocated
|
|
382
|
+
array on a tiled separate TIFF with more than 8 samples per
|
|
383
|
+
pixel. Reported by Kaixiang Zhang of the Cloud Security Team,
|
|
384
|
+
Qihoo 360 (CVE-2016-5321 / CVE-2016-5323 , bugzilla #2558 /
|
|
385
|
+
#2559)
|
|
386
|
+
|
|
387
|
+
<LI> tools/tiffdump.c: fix a few misaligned 64-bit reads warned by
|
|
388
|
+
-fsanitize
|
|
389
|
+
|
|
390
|
+
<LI> tools/tiffdump.c (ReadDirectory): Remove uint32 cast to
|
|
391
|
+
_TIFFmalloc() argument which resulted in Coverity report.
|
|
392
|
+
Added more mutiplication overflow checks.
|
|
393
|
+
|
|
394
|
+
</UL>
|
|
395
|
+
|
|
396
|
+
<P><HR WIDTH=65% ALIGN=left>
|
|
397
|
+
|
|
398
|
+
<!--------------------------------------------------------------------------->
|
|
399
|
+
|
|
400
|
+
<A NAME="contrib"><B><FONT SIZE=+3>C</FONT>HANGES IN THE CONTRIB AREA:</B></A>
|
|
401
|
+
|
|
402
|
+
<UL>
|
|
403
|
+
|
|
404
|
+
<LI> None
|
|
405
|
+
|
|
406
|
+
</UL>
|
|
407
|
+
|
|
408
|
+
Last updated $Date: 2016-11-19 17:47:40 $.
|
|
409
|
+
|
|
410
|
+
</BODY>
|
|
411
|
+
</HTML>
|
|
@@ -0,0 +1,445 @@
|
|
|
1
|
+
<HTML>
|
|
2
|
+
<HEAD>
|
|
3
|
+
<TITLE>
|
|
4
|
+
Changes in TIFF v4.0.8
|
|
5
|
+
</TITLE>
|
|
6
|
+
</HEAD>
|
|
7
|
+
|
|
8
|
+
<BODY BGCOLOR=white>
|
|
9
|
+
<FONT FACE="Helvetica, Arial, Sans">
|
|
10
|
+
|
|
11
|
+
<BASEFONT SIZE=4>
|
|
12
|
+
<B><FONT SIZE=+3>T</FONT>IFF <FONT SIZE=+2>C</FONT>HANGE <FONT SIZE=+2>I</FONT>NFORMATION</B>
|
|
13
|
+
<BASEFONT SIZE=3>
|
|
14
|
+
|
|
15
|
+
<UL>
|
|
16
|
+
<HR SIZE=4 WIDTH=65% ALIGN=left>
|
|
17
|
+
<B>Current Version</B>: v4.0.8<BR>
|
|
18
|
+
<B>Previous Version</B>: <A HREF=v4.0.7.html>v4.0.7</a><BR>
|
|
19
|
+
<B>Master FTP Site</B>: <A HREF="ftp://download.osgeo.org/libtiff">
|
|
20
|
+
download.osgeo.org</a>, directory pub/libtiff</A><BR>
|
|
21
|
+
<B>Master HTTP Site #1</B>: <A HREF="http://www.simplesystems.org/libtiff/">
|
|
22
|
+
http://www.simplesystems.org/libtiff/</a><BR>
|
|
23
|
+
<B>Master HTTP Site #2</B>: <A HREF="http://libtiff.maptools.org/">
|
|
24
|
+
http://libtiff.maptools.org/</a>
|
|
25
|
+
<HR SIZE=4 WIDTH=65% ALIGN=left>
|
|
26
|
+
</UL>
|
|
27
|
+
|
|
28
|
+
<P>
|
|
29
|
+
This document describes the changes made to the software between the
|
|
30
|
+
<I>previous</I> and <I>current</I> versions (see above). If you don't
|
|
31
|
+
find something listed here, then it was not done in this timeframe, or
|
|
32
|
+
it was not considered important enough to be mentioned. The following
|
|
33
|
+
information is located here:
|
|
34
|
+
<UL>
|
|
35
|
+
<LI><A HREF="#highlights">Major Changes</A>
|
|
36
|
+
<LI><A HREF="#configure">Changes in the software configuration</A>
|
|
37
|
+
<LI><A HREF="#libtiff">Changes in libtiff</A>
|
|
38
|
+
<LI><A HREF="#tools">Changes in the tools</A>
|
|
39
|
+
<LI><A HREF="#contrib">Changes in the contrib area</A>
|
|
40
|
+
</UL>
|
|
41
|
+
<p>
|
|
42
|
+
<P><HR WIDTH=65% ALIGN=left>
|
|
43
|
+
|
|
44
|
+
<!--------------------------------------------------------------------------->
|
|
45
|
+
|
|
46
|
+
<A NAME="highlights"><B><FONT SIZE=+3>M</FONT>AJOR CHANGES:</B></A>
|
|
47
|
+
|
|
48
|
+
<UL>
|
|
49
|
+
|
|
50
|
+
<LI> None
|
|
51
|
+
|
|
52
|
+
</UL>
|
|
53
|
+
|
|
54
|
+
|
|
55
|
+
<P><HR WIDTH=65% ALIGN=left>
|
|
56
|
+
<!--------------------------------------------------------------------------->
|
|
57
|
+
|
|
58
|
+
<A NAME="configure"><B><FONT SIZE=+3>C</FONT>HANGES IN THE SOFTWARE CONFIGURATION:</B></A>
|
|
59
|
+
|
|
60
|
+
<UL>
|
|
61
|
+
|
|
62
|
+
<LI> None
|
|
63
|
+
|
|
64
|
+
</UL>
|
|
65
|
+
|
|
66
|
+
<P><HR WIDTH=65% ALIGN=left>
|
|
67
|
+
|
|
68
|
+
<!--------------------------------------------------------------------------->
|
|
69
|
+
|
|
70
|
+
<A NAME="libtiff"><B><FONT SIZE=+3>C</FONT>HANGES IN LIBTIFF:</B></A>
|
|
71
|
+
|
|
72
|
+
<UL>
|
|
73
|
+
|
|
74
|
+
<LI> libtiff/tif_getimage.c, libtiff/tif_open.c: add parenthesis
|
|
75
|
+
to fix cppcheck clarifyCalculation warnings *
|
|
76
|
+
libtiff/tif_predict.c, libtiff/tif_print.c: fix printf
|
|
77
|
+
unsigned vs signed formatting (cppcheck
|
|
78
|
+
invalidPrintfArgType_uint warnings)
|
|
79
|
+
|
|
80
|
+
<LI> libtiff/tif_read.c, libtiff/tiffiop.h: fix uint32 overflow in
|
|
81
|
+
TIFFReadEncodedStrip() that caused an integer division by
|
|
82
|
+
zero. Reported by Agostino Sarubbo. Fixes
|
|
83
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2596
|
|
84
|
+
|
|
85
|
+
<LI> libtiff/tif_pixarlog.c, libtiff/tif_luv.c: fix heap-based
|
|
86
|
+
buffer overflow on generation of PixarLog / LUV compressed
|
|
87
|
+
files, with ColorMap, TransferFunction attached and nasty
|
|
88
|
+
plays with bitspersample. The fix for LUV has not been
|
|
89
|
+
tested, but suffers from the same kind of issue of PixarLog.
|
|
90
|
+
Reported by Agostino Sarubbo. Fixes
|
|
91
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2604
|
|
92
|
+
|
|
93
|
+
<LI> libtiff/tif_strip.c: revert the change in
|
|
94
|
+
TIFFNumberOfStrips() done for
|
|
95
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2587 /
|
|
96
|
+
CVE-2016-9273 since the above change is a better fix that
|
|
97
|
+
makes it unnecessary.
|
|
98
|
+
|
|
99
|
+
<LI> libtiff/tif_dirread.c: modify ChopUpSingleUncompressedStrip()
|
|
100
|
+
to instanciate compute ntrips as
|
|
101
|
+
TIFFhowmany_32(td->td_imagelength, rowsperstrip), instead of a
|
|
102
|
+
logic based on the total size of data. Which is faulty is the
|
|
103
|
+
total size of data is not sufficient to fill the whole image,
|
|
104
|
+
and thus results in reading outside of the
|
|
105
|
+
StripByCounts/StripOffsets arrays when using
|
|
106
|
+
TIFFReadScanline(). Reported by Agostino Sarubbo. Fixes
|
|
107
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2608.
|
|
108
|
+
|
|
109
|
+
<LI> libtiff/tif_ojpeg.c: make OJPEGDecode() early exit in case of
|
|
110
|
+
failure in OJPEGPreDecode(). This will avoid a divide by zero,
|
|
111
|
+
and potential other issues. Reported by Agostino Sarubbo.
|
|
112
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2611
|
|
113
|
+
|
|
114
|
+
<LI> libtiff/tif_write.c: fix misleading indentation as warned by GCC.
|
|
115
|
+
|
|
116
|
+
|
|
117
|
+
<LI> libtiff/tif_fax3.h: revert change done on 2016-01-09 that
|
|
118
|
+
made Param member of TIFFFaxTabEnt structure a uint16 to
|
|
119
|
+
reduce size of the binary. It happens that the Hylafax
|
|
120
|
+
software uses the tables that follow this typedef
|
|
121
|
+
(TIFFFaxMainTable, TIFFFaxWhiteTable, TIFFFaxBlackTable),
|
|
122
|
+
although they are not in a public libtiff header. Raised by
|
|
123
|
+
Lee Howard. Fixes
|
|
124
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2636
|
|
125
|
+
|
|
126
|
+
<LI> libtiff/tiffio.h, libtiff/tif_getimage.c: add
|
|
127
|
+
TIFFReadRGBAStripExt() and TIFFReadRGBATileExt() variants of
|
|
128
|
+
the functions without ext, with an extra argument to control
|
|
129
|
+
the stop_on_error behaviour.
|
|
130
|
+
|
|
131
|
+
<LI> libtiff/tif_getimage.c: fix potential memory leaks in error
|
|
132
|
+
code path of TIFFRGBAImageBegin(). Fixes
|
|
133
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2627
|
|
134
|
+
|
|
135
|
+
<LI> libtiff/tif_jpeg.c: increase libjpeg max memory usable to 10
|
|
136
|
+
MB instead of libjpeg 1MB default. This helps when creating
|
|
137
|
+
files with "big" tile, without using libjpeg temporary files.
|
|
138
|
+
Related to https://trac.osgeo.org/gdal/ticket/6757
|
|
139
|
+
|
|
140
|
+
<LI> libtiff/tif_jpeg.c: avoid integer division by zero in
|
|
141
|
+
JPEGSetupEncode() when horizontal or vertical sampling is set
|
|
142
|
+
to 0. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2653
|
|
143
|
+
|
|
144
|
+
<LI> libtiff/tif_dirwrite.c: in
|
|
145
|
+
TIFFWriteDirectoryTagCheckedRational, replace assertion by
|
|
146
|
+
runtime check to error out if passed value is strictly
|
|
147
|
+
negative. Fixes
|
|
148
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2535
|
|
149
|
+
|
|
150
|
+
<LI> libtiff/tif_dirread.c: avoid division by floating point 0 in
|
|
151
|
+
TIFFReadDirEntryCheckedRational() and
|
|
152
|
+
TIFFReadDirEntryCheckedSrational(), and return 0 in that case
|
|
153
|
+
(instead of infinity as before presumably) Apparently some
|
|
154
|
+
sanitizers do not like those divisions by zero. Fixes
|
|
155
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2644
|
|
156
|
+
|
|
157
|
+
<LI> libtiff/tif_dir.c, tif_dirread.c, tif_dirwrite.c: implement
|
|
158
|
+
various clampings of double to other data types to avoid
|
|
159
|
+
undefined behaviour if the output range isn't big enough to
|
|
160
|
+
hold the input value. Fixes
|
|
161
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2643
|
|
162
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2642
|
|
163
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2646
|
|
164
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2647
|
|
165
|
+
|
|
166
|
+
<LI> libtiff/tif_jpeg.c: validate BitsPerSample in
|
|
167
|
+
JPEGSetupEncode() to avoid undefined behaviour caused by
|
|
168
|
+
invalid shift exponent. Fixes
|
|
169
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2648
|
|
170
|
+
|
|
171
|
+
<LI> libtiff/tif_read.c: avoid potential undefined behaviour on
|
|
172
|
+
signed integer addition in TIFFReadRawStrip1() in isMapped()
|
|
173
|
+
case. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2650
|
|
174
|
+
|
|
175
|
+
<LI> libtiff/tif_getimage.c: add explicit uint32 cast in
|
|
176
|
+
putagreytile to avoid UndefinedBehaviorSanitizer warning.
|
|
177
|
+
Patch by Nicolás Peña. Fixes
|
|
178
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2658
|
|
179
|
+
|
|
180
|
+
<LI> libtiff/tif_read.c: TIFFReadBufferSetup(): use _TIFFcalloc()
|
|
181
|
+
to zero initialize tif_rawdata. Fixes
|
|
182
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2651
|
|
183
|
+
|
|
184
|
+
<LI> libtiff/tiffio.h, tif_unix.c, tif_win32.c, tif_vms.c: add
|
|
185
|
+
_TIFFcalloc()
|
|
186
|
+
|
|
187
|
+
<LI> libtiff/tif_luv.c, tif_lzw.c, tif_packbits.c: return 0 in
|
|
188
|
+
Encode functions instead of -1 when TIFFFlushData1() fails.
|
|
189
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2130
|
|
190
|
+
|
|
191
|
+
<LI> libtiff/tif_ojpeg.c: fix leak in
|
|
192
|
+
OJPEGReadHeaderInfoSecTablesQTable,
|
|
193
|
+
OJPEGReadHeaderInfoSecTablesDcTable and
|
|
194
|
+
OJPEGReadHeaderInfoSecTablesAcTable when read fails. Patch by
|
|
195
|
+
Nicolás Peña. Fixes
|
|
196
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2659
|
|
197
|
+
|
|
198
|
+
<LI> libtiff/tif_jpeg.c: only run JPEGFixupTagsSubsampling() if
|
|
199
|
+
the YCbCrSubsampling tag is not explicitly present. This helps
|
|
200
|
+
a bit to reduce the I/O amount when the tag is present
|
|
201
|
+
(especially on cloud hosted files).
|
|
202
|
+
|
|
203
|
+
<LI> libtiff/tif_lzw.c: in LZWPostEncode(), increase, if
|
|
204
|
+
necessary, the code bit-width after flushing the remaining
|
|
205
|
+
code and before emitting the EOI code. Fixes
|
|
206
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=1982
|
|
207
|
+
|
|
208
|
+
<LI> libtiff/tif_pixarlog.c: fix memory leak in error code path of
|
|
209
|
+
PixarLogSetupDecode(). Patch by Nicolás Peña. Fixes
|
|
210
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2665
|
|
211
|
+
|
|
212
|
+
<LI> libtiff/tif_fax3.c, tif_predict.c, tif_getimage.c: fix GCC 7
|
|
213
|
+
-Wimplicit-fallthrough warnings.
|
|
214
|
+
|
|
215
|
+
<LI> libtiff/tif_dirread.c: fix memory leak in non
|
|
216
|
+
DEFER_STRILE_LOAD mode (ie default) when there is both a
|
|
217
|
+
StripOffsets and TileOffsets tag, or a StripByteCounts and
|
|
218
|
+
TileByteCounts Fixes
|
|
219
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2689
|
|
220
|
+
|
|
221
|
+
<LI> libtiff/tif_ojpeg.c: fix potential memory leak in
|
|
222
|
+
OJPEGReadHeaderInfoSecTablesQTable,
|
|
223
|
+
OJPEGReadHeaderInfoSecTablesDcTable and
|
|
224
|
+
OJPEGReadHeaderInfoSecTablesAcTable Patch by Nicolás Peña.
|
|
225
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2670
|
|
226
|
+
|
|
227
|
+
<LI> libtiff/tif_fax3.c: avoid crash in Fax3Close() on empty file.
|
|
228
|
+
Patch by Alan Coopersmith + complement by myself. Fixes
|
|
229
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2673
|
|
230
|
+
|
|
231
|
+
<LI> libtiff/tif_read.c: TIFFFillStrip(): add limitation to the
|
|
232
|
+
number of bytes read in case td_stripbytecount[strip] is
|
|
233
|
+
bigger than reasonable, so as to avoid excessive memory
|
|
234
|
+
allocation.
|
|
235
|
+
|
|
236
|
+
<LI> libtiff/tif_zip.c, tif_pixarlog.c, tif_predict.c: fix memory
|
|
237
|
+
leak when the underlying codec (ZIP, PixarLog) succeeds its
|
|
238
|
+
setupdecode() method, but PredictorSetup fails. Credit to
|
|
239
|
+
OSS-Fuzz (locally run, on GDAL)
|
|
240
|
+
|
|
241
|
+
<LI> libtiff/tif_read.c: TIFFFillStrip() and TIFFFillTile(): avoid
|
|
242
|
+
excessive memory allocation in case of shorten files. Only
|
|
243
|
+
effective on 64 bit builds and non-mapped cases. Credit to
|
|
244
|
+
OSS-Fuzz (locally run, on GDAL)
|
|
245
|
+
|
|
246
|
+
<LI> libtiff/tif_read.c: TIFFFillStripPartial() / TIFFSeek(),
|
|
247
|
+
avoid potential integer overflows with read_ahead in
|
|
248
|
+
CHUNKY_STRIP_READ_SUPPORT mode. Should
|
|
249
|
+
especially occur on 32 bit platforms.
|
|
250
|
+
|
|
251
|
+
<LI> libtiff/tif_read.c: TIFFFillStripPartial(): avoid excessive
|
|
252
|
+
memory allocation in case of shorten files. Only effective on
|
|
253
|
+
64 bit builds. Credit to OSS-Fuzz (locally run, on GDAL)
|
|
254
|
+
|
|
255
|
+
<LI> libtiff/tif_read.c: update tif_rawcc in
|
|
256
|
+
CHUNKY_STRIP_READ_SUPPORT mode with tif_rawdataloaded when
|
|
257
|
+
calling TIFFStartStrip() or TIFFFillStripPartial(). This
|
|
258
|
+
avoids reading beyond tif_rawdata when bytecount >
|
|
259
|
+
tif_rawdatasize. Fixes
|
|
260
|
+
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1545.
|
|
261
|
+
Credit to OSS-Fuzz
|
|
262
|
+
|
|
263
|
+
<LI> libtiff/tif_color.c: avoid potential int32 overflow in
|
|
264
|
+
TIFFYCbCrToRGBInit() Fixes
|
|
265
|
+
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1533
|
|
266
|
+
Credit to OSS-Fuzz
|
|
267
|
+
|
|
268
|
+
<LI> libtiff/tif_pixarlog.c, tif_luv.c: avoid potential int32
|
|
269
|
+
overflows in multiply_ms() and add_ms(). Fixes
|
|
270
|
+
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1558
|
|
271
|
+
Credit to OSS-Fuzz
|
|
272
|
+
|
|
273
|
+
<LI> libtiff/tif_packbits.c: fix out-of-buffer read in
|
|
274
|
+
PackBitsDecode() Fixes
|
|
275
|
+
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1563
|
|
276
|
+
Credit to OSS-Fuzz
|
|
277
|
+
|
|
278
|
+
<LI> libtiff/tif_luv.c: LogL16InitState(): avoid excessive memory
|
|
279
|
+
allocation when RowsPerStrip tag is missing.
|
|
280
|
+
Credit to OSS-Fuzz (locally run, on GDAL)
|
|
281
|
+
|
|
282
|
+
<LI> libtiff/tif_lzw.c: update dec_bitsleft at beginning of
|
|
283
|
+
LZWDecode(), and update tif_rawcc at end of LZWDecode(). This
|
|
284
|
+
is needed to properly work with the latest chnges in
|
|
285
|
+
tif_read.c in CHUNKY_STRIP_READ_SUPPORT mode.
|
|
286
|
+
|
|
287
|
+
<LI> libtiff/tif_pixarlog.c: PixarLogDecode(): resync tif_rawcp
|
|
288
|
+
with next_in and tif_rawcc with avail_in at beginning and end
|
|
289
|
+
of function, similarly to what is done in LZWDecode(). Likely
|
|
290
|
+
needed so that it works properly with latest chnges in
|
|
291
|
+
tif_read.c in CHUNKY_STRIP_READ_SUPPORT mode. But untested...
|
|
292
|
+
|
|
293
|
+
<LI> libtiff/tif_getimage.c: initYCbCrConversion(): add basic
|
|
294
|
+
validation of luma and refBlackWhite coefficients (just check
|
|
295
|
+
they are not NaN for now), to avoid potential float to int
|
|
296
|
+
overflows. Fixes
|
|
297
|
+
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1663
|
|
298
|
+
Credit to OSS Fuzz
|
|
299
|
+
|
|
300
|
+
<LI> libtiff/tif_read.c: _TIFFVSetField(): fix outside range cast
|
|
301
|
+
of double to float. Credit to Google Autofuzz project
|
|
302
|
+
|
|
303
|
+
<LI> libtiff/tif_getimage.c: initYCbCrConversion(): check luma[1]
|
|
304
|
+
is not zero to avoid division by zero. Fixes
|
|
305
|
+
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1665
|
|
306
|
+
Credit to OSS Fuzz
|
|
307
|
+
|
|
308
|
+
<LI> libtiff/tif_read.c: _TIFFVSetField(): fix outside range cast
|
|
309
|
+
of double to float. Credit to Google Autofuzz project
|
|
310
|
+
|
|
311
|
+
<LI> libtiff/tif_getimage.c: initYCbCrConversion(): check luma[1]
|
|
312
|
+
is not zero to avoid division by zero. Fixes
|
|
313
|
+
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1665
|
|
314
|
+
Credit to OSS Fuzz
|
|
315
|
+
|
|
316
|
+
<LI> libtiff/tif_getimage.c: initYCbCrConversion(): stricter
|
|
317
|
+
validation for refBlackWhite coefficients values. To avoid
|
|
318
|
+
invalid float->int32 conversion. Fixes
|
|
319
|
+
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1718
|
|
320
|
+
Credit to OSS Fuzz
|
|
321
|
+
|
|
322
|
+
</UL>
|
|
323
|
+
|
|
324
|
+
<P><HR WIDTH=65% ALIGN=left>
|
|
325
|
+
|
|
326
|
+
<!-------------------------------------------------------------------------->
|
|
327
|
+
|
|
328
|
+
<A NAME="tools"><B><FONT SIZE=+3>C</FONT>HANGES IN THE TOOLS:</B></A>
|
|
329
|
+
|
|
330
|
+
<UL>
|
|
331
|
+
|
|
332
|
+
<LI> tools/fax2tiff.c (main): Applied patch by Jörg Ahrens to fix
|
|
333
|
+
passing client data for Win32 builds using tif_win32.c
|
|
334
|
+
(USE_WIN32_FILEIO defined) for file I/O. Patch was provided
|
|
335
|
+
via email on November 20, 2016.
|
|
336
|
+
|
|
337
|
+
<LI> tools/tiffcp.c: avoid uint32 underflow in cpDecodedStrips
|
|
338
|
+
that can cause various issues, such as buffer overflows in the
|
|
339
|
+
library. Reported by Agostino Sarubbo. Fixes
|
|
340
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2598
|
|
341
|
+
|
|
342
|
+
<LI> tools/tiffcrop.c: fix readContigStripsIntoBuffer() in -i
|
|
343
|
+
(ignore) mode so that the output buffer is correctly
|
|
344
|
+
incremented to avoid write outside bounds. Reported by
|
|
345
|
+
Agostino Sarubbo. Fixes
|
|
346
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2620
|
|
347
|
+
|
|
348
|
+
<LI> tools/tiffcrop.c: add 3 extra bytes at end of strip buffer in
|
|
349
|
+
readSeparateStripsIntoBuffer() to avoid read outside of heap
|
|
350
|
+
allocated buffer. Reported by Agostino Sarubbo. Fixes
|
|
351
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2621
|
|
352
|
+
|
|
353
|
+
<LI> tools/tiffcrop.c: fix integer division by zero when
|
|
354
|
+
BitsPerSample is missing. Reported by Agostino Sarubbo.
|
|
355
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2619
|
|
356
|
+
|
|
357
|
+
<LI> tools/tiffinfo.c: fix null pointer dereference in -r mode
|
|
358
|
+
when the image has no StripByteCount tag. Reported by
|
|
359
|
+
Agostino Sarubbo. Fixes
|
|
360
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2594
|
|
361
|
+
|
|
362
|
+
<LI> tools/tiffcp.c: avoid potential division by zero is
|
|
363
|
+
BitsPerSamples tag is missing. Reported by Agostino Sarubbo.
|
|
364
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2597
|
|
365
|
+
|
|
366
|
+
<LI> tools/tif_dir.c: when TIFFGetField(, TIFFTAG_NUMBEROFINKS, )
|
|
367
|
+
is called, limit the return number of inks to SamplesPerPixel,
|
|
368
|
+
so that code that parses ink names doesn't go past the end of
|
|
369
|
+
the buffer. Reported by Agostino Sarubbo. Fixes
|
|
370
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2599
|
|
371
|
+
|
|
372
|
+
<LI> tools/tiffcp.c: avoid potential division by zero is
|
|
373
|
+
BitsPerSamples tag is missing. Reported by Agostino Sarubbo.
|
|
374
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2607
|
|
375
|
+
|
|
376
|
+
<LI> tools/tiffcp.c: fix uint32 underflow/overflow that can cause
|
|
377
|
+
heap-based buffer overflow. Reported by Agostino Sarubbo.
|
|
378
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2610
|
|
379
|
+
|
|
380
|
+
<LI> tools/tiffcp.c: replace assert( (bps % 8) == 0 ) by a non
|
|
381
|
+
assert check. Reported by Agostino Sarubbo. Fixes
|
|
382
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2605
|
|
383
|
+
|
|
384
|
+
<LI> tools/tiff2ps.c: fix 2 heap-based buffer overflows (in
|
|
385
|
+
PSDataBW and PSDataColorContig). Reported by Agostino Sarubbo.
|
|
386
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2633 and
|
|
387
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2634.
|
|
388
|
+
|
|
389
|
+
<LI> tools/tiff2pdf.c: prevent heap-based buffer overflow in -j
|
|
390
|
+
mode on a paletted image. Note: this fix errors out before the
|
|
391
|
+
overflow happens. There could probably be a better fix. Fixes
|
|
392
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2635
|
|
393
|
+
|
|
394
|
+
<LI> tools/tiff2pdf.c: fix wrong usage of memcpy() that can
|
|
395
|
+
trigger unspecified behaviour. Fixes
|
|
396
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2638
|
|
397
|
+
|
|
398
|
+
<LI> tools/tiff2pdf.c: avoid potential invalid memory read in
|
|
399
|
+
t2p_writeproc. Fixes
|
|
400
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2639
|
|
401
|
+
|
|
402
|
+
<LI> tools/tiff2pdf.c: avoid potential heap-based overflow in
|
|
403
|
+
t2p_readwrite_pdf_image_tile(). Fixes
|
|
404
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2640
|
|
405
|
+
|
|
406
|
+
<LI> tools/tiffcrop.c: remove extraneous TIFFClose() in error code
|
|
407
|
+
path, that caused double free. Related to
|
|
408
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2535
|
|
409
|
+
|
|
410
|
+
<LI> tools/tiffcp.c: error out cleanly in cpContig2SeparateByRow
|
|
411
|
+
and cpSeparate2ContigByRow if BitsPerSample != 8 to avoid heap
|
|
412
|
+
based overflow. Fixes
|
|
413
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2656 and
|
|
414
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2657
|
|
415
|
+
|
|
416
|
+
<LI> tools/raw2tiff.c: avoid integer division by zero. Fixes
|
|
417
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2631
|
|
418
|
+
|
|
419
|
+
<LI> tools/tiff2ps.c: call TIFFClose() in error code paths.
|
|
420
|
+
|
|
421
|
+
<LI> tools/fax2tiff.c: emit appropriate message if the input file
|
|
422
|
+
is empty. Patch by Alan Coopersmith. Fixes
|
|
423
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2672
|
|
424
|
+
|
|
425
|
+
<LI> tools/tiff2bw.c: close TIFF handle in error code path. Fixes
|
|
426
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2677
|
|
427
|
+
|
|
428
|
+
</UL>
|
|
429
|
+
|
|
430
|
+
<P><HR WIDTH=65% ALIGN=left>
|
|
431
|
+
|
|
432
|
+
<!--------------------------------------------------------------------------->
|
|
433
|
+
|
|
434
|
+
<A NAME="contrib"><B><FONT SIZE=+3>C</FONT>HANGES IN THE CONTRIB AREA:</B></A>
|
|
435
|
+
|
|
436
|
+
<UL>
|
|
437
|
+
|
|
438
|
+
<LI> None
|
|
439
|
+
|
|
440
|
+
</UL>
|
|
441
|
+
|
|
442
|
+
Last updated $Date: 2017-05-21 17:47:46 $.
|
|
443
|
+
|
|
444
|
+
</BODY>
|
|
445
|
+
</HTML>
|