laag-libtiff 4.0.9.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.gitignore +57 -0
- data/LICENSE.txt +21 -0
- data/README.org +34 -0
- data/ext/laag/libtiff/extconf.rb +13 -0
- data/laag-libtiff.gemspec +20 -0
- data/lib/laag/libtiff.rb +29 -0
- data/vendor/gitlab.com/libtiff/libtiff/.appveyor.yml +109 -0
- data/vendor/gitlab.com/libtiff/libtiff/.cvsignore +4 -0
- data/vendor/gitlab.com/libtiff/libtiff/.travis.yml +34 -0
- data/vendor/gitlab.com/libtiff/libtiff/CMakeLists.txt +764 -0
- data/vendor/gitlab.com/libtiff/libtiff/COMMITTERS +19 -0
- data/vendor/gitlab.com/libtiff/libtiff/COPYRIGHT +21 -0
- data/vendor/gitlab.com/libtiff/libtiff/ChangeLog +8073 -0
- data/vendor/gitlab.com/libtiff/libtiff/HOWTO-RELEASE +119 -0
- data/vendor/gitlab.com/libtiff/libtiff/HOWTO-SECURITY-RELEASE +19 -0
- data/vendor/gitlab.com/libtiff/libtiff/Makefile.am +91 -0
- data/vendor/gitlab.com/libtiff/libtiff/Makefile.in +995 -0
- data/vendor/gitlab.com/libtiff/libtiff/Makefile.vc +58 -0
- data/vendor/gitlab.com/libtiff/libtiff/README +61 -0
- data/vendor/gitlab.com/libtiff/libtiff/README.vms +12 -0
- data/vendor/gitlab.com/libtiff/libtiff/RELEASE-DATE +1 -0
- data/vendor/gitlab.com/libtiff/libtiff/SConstruct +171 -0
- data/vendor/gitlab.com/libtiff/libtiff/TODO +12 -0
- data/vendor/gitlab.com/libtiff/libtiff/VERSION +1 -0
- data/vendor/gitlab.com/libtiff/libtiff/aclocal.m4 +1194 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/html/man/bmp2tiff.1.html +121 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/html/man/gif2tiff.1.html +141 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/html/man/ras2tiff.1.html +139 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/html/man/sgi2tiff.1.html +147 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/html/man/tiffsv.1.html +207 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/man/bmp2tiff.1 +85 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/man/gif2tiff.1 +81 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/man/ras2tiff.1 +96 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/man/sgi2tiff.1 +93 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/man/tiffsv.1 +142 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/tools/bmp2tiff.c +937 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/tools/gif2tiff.c +591 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/tools/ras2tiff.c +338 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/tools/rasterfile.h +44 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/tools/sgi2tiff.c +337 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/tools/sgisv.c +318 -0
- data/vendor/gitlab.com/libtiff/libtiff/archive/tools/ycbcr.c +168 -0
- data/vendor/gitlab.com/libtiff/libtiff/autogen.sh +8 -0
- data/vendor/gitlab.com/libtiff/libtiff/build/.cvsignore +1 -0
- data/vendor/gitlab.com/libtiff/libtiff/build/CMakeLists.txt +25 -0
- data/vendor/gitlab.com/libtiff/libtiff/build/Makefile.am +32 -0
- data/vendor/gitlab.com/libtiff/libtiff/build/Makefile.in +680 -0
- data/vendor/gitlab.com/libtiff/libtiff/build/README +3 -0
- data/vendor/gitlab.com/libtiff/libtiff/build/travis-ci +108 -0
- data/vendor/gitlab.com/libtiff/libtiff/commit +233 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/compile +347 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/config.guess +1526 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/config.sub +1658 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/depcomp +791 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/install-sh +507 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/ltmain.sh +11156 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/missing +215 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/mkinstalldirs +161 -0
- data/vendor/gitlab.com/libtiff/libtiff/config/test-driver +127 -0
- data/vendor/gitlab.com/libtiff/libtiff/configure +23612 -0
- data/vendor/gitlab.com/libtiff/libtiff/configure.ac +1112 -0
- data/vendor/gitlab.com/libtiff/libtiff/configure.com +1357 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/CMakeLists.txt +35 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/Makefile.am +31 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/Makefile.in +679 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/README +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/.cvsignore +5 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/CMakeLists.txt +34 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/Makefile.am +39 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/Makefile.in +652 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/Makefile.vc +28 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/README +142 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/addtiffo.c +181 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/tif_overview.c +916 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/tif_ovrcache.c +344 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/addtiffo/tif_ovrcache.h +103 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/.cvsignore +8 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/CMakeLists.txt +43 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/Makefile.am +46 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/Makefile.in +798 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/README +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/tiff-bi.c +91 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/tiff-grayscale.c +147 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/tiff-palette.c +284 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/tiff-rgb.c +201 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/xtiff/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/xtiff/CMakeLists.txt +29 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/xtiff/Makefile.am +47 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/xtiff/Makefile.in +516 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/xtiff/README +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/xtiff/patchlevel.h +8 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/xtiff/xtiff.c +1290 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/dbs/xtiff/xtifficon.h +21 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/iptcutil/.cvsignore +5 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/iptcutil/CMakeLists.txt +35 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/iptcutil/Makefile.am +40 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/iptcutil/Makefile.in +650 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/iptcutil/README +25 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/iptcutil/iptcutil.c +954 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/iptcutil/test.iptc +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/iptcutil/test.txt +32 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/mfs/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/mfs/CMakeLists.txt +27 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/mfs/Makefile.am +29 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/mfs/Makefile.in +499 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/mfs/README +37 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/mfs/mfs_file.c +586 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/CMakeLists.txt +30 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/Makefile.am +32 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/Makefile.in +502 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/README +90 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/tif_imageiter.c +525 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/tif_imageiter.h +64 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/tif_pdsdirread.c +1131 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/pds/tif_pdsdirwrite.c +971 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/ras/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/ras/CMakeLists.txt +28 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/ras/Makefile.am +30 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/ras/Makefile.in +500 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/ras/README +10 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/ras/ras2tif.c +254 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/ras/tif2ras.c +344 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/stream/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/stream/CMakeLists.txt +28 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/stream/Makefile.am +30 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/stream/Makefile.in +500 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/stream/README +30 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/stream/tiffstream.cpp +238 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/stream/tiffstream.h +70 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/CMakeLists.txt +32 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/Makefile.am +33 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/Makefile.in +503 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/README +132 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/listtif.c +39 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/maketif.c +77 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/xtif_dir.c +350 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/xtiffio.h +59 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/tags/xtiffiop.h +72 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/CMakeLists.txt +30 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/Makefile.am +32 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/Makefile.in +502 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/Makefile.w95 +134 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/README.Tiffile +31 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/README.tiff2dib +51 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/Tiffile.cpp +449 -0
- data/vendor/gitlab.com/libtiff/libtiff/contrib/win_dib/tiff2dib.c +379 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/.cvsignore +5 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/BigTIFFProposal.html +99 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/CMakeLists.txt +87 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/Makefile.am +96 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/Makefile.in +798 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/TIFFTechNote2.html +707 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/addingtags.html +292 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/bigtiffdesign.html +80 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/bigtiffpr.html +77 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/bigtiffpr_images/esri.png +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/bigtiffpr_images/leica.png +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/bigtiffpr_images/safe.png +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/bigtiffpr_images/weogeo.png +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/bugs.html +61 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/build.html +737 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/contrib.html +209 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/document.html +52 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images.html +41 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/CMakeLists.txt +46 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/Makefile.am +49 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/Makefile.in +572 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/back.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/bali.jpg +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/cat.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/cover.jpg +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/cramps.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/dave.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/info.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/jello.jpg +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/jim.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/note.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/oxford.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/quad.jpg +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/ring.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/smallliz.jpg +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/strike.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/images/warning.gif +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/index.html +122 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/internals.html +572 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/intro.html +68 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/libtiff.html +747 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/.cvsignore +2 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/CMakeLists.txt +108 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/HtmlDoc.cmake +50 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/Makefile.am +122 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/Makefile.in +642 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFClose.3tiff.html +87 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFDataWidth.3tiff.html +98 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFError.3tiff.html +106 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFFieldDataType.3tiff.html +89 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFFieldName.3tiff.html +86 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFFieldPassCount.3tiff.html +98 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFFieldReadCount.3tiff.html +101 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFFieldTag.3tiff.html +88 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFFieldWriteCount.3tiff.html +108 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFFlush.3tiff.html +113 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFGetField.3tiff.html +1969 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFOpen.3tiff.html +421 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFPrintDirectory.3tiff.html +225 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFRGBAImage.3tiff.html +319 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadDirectory.3tiff.html +218 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadEncodedStrip.3tiff.html +133 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadEncodedTile.3tiff.html +130 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadRGBAImage.3tiff.html +301 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadRGBAStrip.3tiff.html +208 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadRGBATile.3tiff.html +261 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadRawStrip.3tiff.html +109 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadRawTile.3tiff.html +111 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadScanline.3tiff.html +157 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFReadTile.3tiff.html +133 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFSetDirectory.3tiff.html +122 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFSetField.3tiff.html +1865 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFWarning.3tiff.html +108 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFWriteDirectory.3tiff.html +176 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFWriteEncodedStrip.3tiff.html +153 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFWriteEncodedTile.3tiff.html +147 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFWriteRawStrip.3tiff.html +144 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFWriteRawTile.3tiff.html +128 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFWriteScanline.3tiff.html +206 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFWriteTile.3tiff.html +115 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFbuffer.3tiff.html +116 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFcodec.3tiff.html +116 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFcolor.3tiff.html +975 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFmemory.3tiff.html +110 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFquery.3tiff.html +148 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFsize.3tiff.html +95 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFstrip.3tiff.html +129 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFswab.3tiff.html +110 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/TIFFtile.3tiff.html +141 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/fax2ps.1.html +252 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/fax2tiff.1.html +607 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/index.html +64 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/libtiff.3tiff.html +1150 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/pal2rgb.1.html +189 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/ppm2tiff.1.html +141 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/raw2tiff.1.html +510 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/rgb2ycbcr.1.html +155 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/thumbnail.1.html +148 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiff2bw.1.html +161 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiff2pdf.1.html +609 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiff2ps.1.html +639 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiff2rgba.1.html +162 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffcmp.1.html +156 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffcp.1.html +569 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffcrop.1.html +684 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffdither.1.html +196 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffdump.1.html +145 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffgt.1.html +551 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffinfo.1.html +196 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffmedian.1.html +183 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffset.1.html +176 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/man/tiffsplit.1.html +102 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/misc.html +117 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/support.html +655 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/tools.html +137 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta007.html +112 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta016.html +122 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta018.html +84 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta024.html +139 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta028.html +146 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta029.html +86 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta031.html +94 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta032.html +90 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta033.html +82 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta034.html +68 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta035.html +63 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.4beta036.html +117 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.5.1.html +75 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.5.2.html +108 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.5.3.html +132 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.5.4.html +88 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.5.5.html +155 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.5.6-beta.html +185 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.5.7.html +259 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.6.0.html +434 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.6.1.html +199 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.7.0.html +144 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.7.0alpha.html +249 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.7.0beta.html +162 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.7.0beta2.html +131 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.7.1.html +233 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.7.2.html +222 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.7.3.html +230 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.7.4.html +133 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.8.0.html +199 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.8.1.html +217 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.8.2.html +137 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.9.0.html +261 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.9.0beta.html +304 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.9.1.html +115 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.9.2.html +122 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.9.3.html +160 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.9.4.html +125 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v3.9.5.html +270 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.0.html +269 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.1.html +113 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.2.html +118 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.3.html +125 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.4.html +274 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.4beta.html +291 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.5.html +148 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.6.html +139 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.7.html +411 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.8.html +445 -0
- data/vendor/gitlab.com/libtiff/libtiff/html/v4.0.9.html +373 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff-4.pc.in +11 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/.cvsignore +22 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/CMakeLists.txt +165 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/Makefile.am +154 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/Makefile.in +966 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/Makefile.lcc +129 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/Makefile.vc +102 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/SConstruct +73 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/libtiff.def +168 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/libtiff.map +4 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/libtiffxx.map +4 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/mkg3states.c +454 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/mkspans.c +82 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/t4.h +292 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_aux.c +376 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_close.c +140 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_codec.c +165 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_color.c +309 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_compress.c +304 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_config.h-vms +46 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_config.h.cmake.in +261 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_config.h.in +410 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_config.vc.h +137 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_config.wince.h +71 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_dir.c +1767 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_dir.h +309 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_dirinfo.c +1070 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_dirread.c +5803 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_dirwrite.c +3024 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_dumpmode.c +143 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_error.c +88 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_extension.c +118 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_fax3.c +1648 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_fax3.h +540 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_fax3sm.c +1260 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_flush.c +118 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_getimage.c +3048 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_jbig.c +214 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_jpeg.c +2601 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_jpeg_12.c +69 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_luv.c +1765 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_lzma.c +495 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_lzw.c +1218 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_next.c +189 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_ojpeg.c +2563 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_open.c +725 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_packbits.c +311 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_pixarlog.c +1485 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_predict.c +881 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_predict.h +79 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_print.c +722 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_read.c +1572 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_stream.cxx +430 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_strip.c +389 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_swab.c +312 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_thunder.c +208 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_tile.c +322 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_unix.c +386 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_version.c +40 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_vms.c +611 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_warning.c +89 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_win32.c +476 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_wince.c +293 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_write.c +834 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tif_zip.c +476 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiff.h +681 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffconf.h-vms +99 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffconf.h.cmake.in +130 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffconf.h.in +127 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffconf.vc.h +161 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffconf.wince.h +121 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffio.h +560 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffio.hxx +49 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffiop.h +445 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffvers.h +9 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/tiffvers.h.in +9 -0
- data/vendor/gitlab.com/libtiff/libtiff/libtiff/uvcode.h +180 -0
- data/vendor/gitlab.com/libtiff/libtiff/m4/acinclude.m4 +851 -0
- data/vendor/gitlab.com/libtiff/libtiff/m4/ice_find_athena.m4 +187 -0
- data/vendor/gitlab.com/libtiff/libtiff/m4/libtool.m4 +8388 -0
- data/vendor/gitlab.com/libtiff/libtiff/m4/ltoptions.m4 +437 -0
- data/vendor/gitlab.com/libtiff/libtiff/m4/ltsugar.m4 +124 -0
- data/vendor/gitlab.com/libtiff/libtiff/m4/ltversion.m4 +23 -0
- data/vendor/gitlab.com/libtiff/libtiff/m4/lt~obsolete.m4 +99 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/.cvsignore +3 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/CMakeLists.txt +97 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/Makefile.am +94 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/Makefile.in +684 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFClose.3tiff +53 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFDataWidth.3tiff +74 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFError.3tiff +69 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFFieldDataType.3tiff +53 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFFieldName.3tiff +52 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFFieldPassCount.3tiff +73 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFFieldReadCount.3tiff +77 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFFieldTag.3tiff +56 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFFieldWriteCount.3tiff +88 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFFlush.3tiff +64 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFGetField.3tiff +229 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFOpen.3tiff +279 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFPrintDirectory.3tiff +70 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFRGBAImage.3tiff +286 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadDirectory.3tiff +164 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadEncodedStrip.3tiff +78 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadEncodedTile.3tiff +76 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadRGBAImage.3tiff +218 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadRGBAStrip.3tiff +170 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadRGBATile.3tiff +171 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadRawStrip.3tiff +64 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadRawTile.3tiff +65 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadScanline.3tiff +94 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFReadTile.3tiff +84 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFSetDirectory.3tiff +79 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFSetField.3tiff +217 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFWarning.3tiff +70 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFWriteDirectory.3tiff +138 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFWriteEncodedStrip.3tiff +102 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFWriteEncodedTile.3tiff +96 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFWriteRawStrip.3tiff +96 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFWriteRawTile.3tiff +84 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFWriteScanline.3tiff +154 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFWriteTile.3tiff +77 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFbuffer.3tiff +77 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFcodec.3tiff +82 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFcolor.3tiff +268 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFmemory.3tiff +90 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFquery.3tiff +142 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFsize.3tiff +59 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFstrip.3tiff +99 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFswab.3tiff +80 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/TIFFtile.3tiff +131 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/fax2ps.1 +159 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/fax2tiff.1 +286 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/libtiff.3tiff +545 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/pal2rgb.1 +111 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/ppm2tiff.1 +105 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/raw2tiff.1 +196 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/rgb2ycbcr.1 +99 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/thumbnail.1 +90 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiff2bw.1 +94 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiff2pdf.1 +254 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiff2ps.1 +294 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiff2rgba.1 +97 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffcmp.1 +87 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffcp.1 +317 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffcrop.1 +571 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffdither.1 +135 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffdump.1 +81 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffgt.1 +245 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffinfo.1 +88 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffmedian.1 +112 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffset.1 +99 -0
- data/vendor/gitlab.com/libtiff/libtiff/man/tiffsplit.1 +69 -0
- data/vendor/gitlab.com/libtiff/libtiff/nmake.opt +229 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/.cvsignore +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/CMakeLists.txt +60 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/Makefile.am +35 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/Makefile.in +656 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/Makefile.vc +44 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/dummy.c +12 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/getopt.c +125 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/lfind.c +62 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/libport.h +60 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/snprintf.c +38 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/strcasecmp.c +51 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/strtoul.c +109 -0
- data/vendor/gitlab.com/libtiff/libtiff/port/strtoull.c +116 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/.cvsignore +12 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/CMakeLists.txt +382 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/Makefile.am +334 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/Makefile.in +1987 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/TiffSplitTest.cmake +34 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/TiffTest.cmake +63 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/TiffTestCommon.cmake +108 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/ascii_tag.c +177 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/check_tag.c +91 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/common.sh +122 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/custom_dir.c +247 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/README.txt +29 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/logluv-3c-16b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/minisblack-1c-16b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/minisblack-1c-8b.pgm +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/minisblack-1c-8b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/minisblack-2c-8b-alpha.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/miniswhite-1c-1b.pbm +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/miniswhite-1c-1b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/palette-1c-1b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/palette-1c-4b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/palette-1c-8b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/quad-lzw-compat.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/quad-tile.jpg.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/rgb-3c-16b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/rgb-3c-8b.ppm +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/images/rgb-3c-8b.tiff +0 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/long_tag.c +156 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/ppm2tiff_pbm.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/ppm2tiff_pgm.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/ppm2tiff_ppm.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/raw_decode.c +304 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/rewrite_tag.c +344 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/short_tag.c +205 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/strip.c +290 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/strip_rw.c +157 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/test_arrays.c +829 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/test_arrays.h +63 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2bw-palette-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2bw-quad-lzw-compat.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2bw-rgb-3c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2pdf.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2ps-EPS1.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2ps-PS1.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2ps-PS2.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2ps-PS3.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-logluv-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-minisblack-1c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-minisblack-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-minisblack-2c-8b-alpha.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-miniswhite-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-palette-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-palette-1c-4b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-palette-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-quad-tile.jpg.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-rgb-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiff2rgba-rgb-3c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-g3-1d-fill.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-g3-1d.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-g3-2d-fill.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-g3-2d.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-g3.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-g4.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-logluv.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-lzw-compat.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-split-join.sh +16 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-split.sh +13 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcp-thumbnail.sh +10 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-logluv-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-minisblack-1c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-minisblack-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-minisblack-2c-8b-alpha.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-miniswhite-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-palette-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-palette-1c-4b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-palette-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-quad-tile.jpg.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-rgb-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-R90-rgb-3c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-logluv-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-minisblack-1c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-minisblack-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-minisblack-2c-8b-alpha.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-miniswhite-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-palette-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-palette-1c-4b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-palette-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-quad-tile.jpg.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-rgb-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-doubleflip-rgb-3c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-logluv-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-minisblack-1c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-minisblack-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-minisblack-2c-8b-alpha.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-miniswhite-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-palette-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-palette-1c-4b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-palette-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-quad-tile.jpg.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-rgb-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extract-rgb-3c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-logluv-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-minisblack-1c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-minisblack-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-minisblack-2c-8b-alpha.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-miniswhite-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-palette-1c-1b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-palette-1c-4b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-palette-1c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-quad-tile.jpg.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-rgb-3c-16b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffcrop-extractz14-rgb-3c-8b.sh +7 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffdump.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tiffinfo.sh +6 -0
- data/vendor/gitlab.com/libtiff/libtiff/test/tifftest.h +42 -0
- data/vendor/gitlab.com/libtiff/libtiff/tiff.spec +68 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/.cvsignore +27 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/CMakeLists.txt +125 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/Makefile.am +138 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/Makefile.in +955 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/Makefile.lcc +133 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/Makefile.vc +52 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/fax2ps.c +463 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/fax2tiff.c +491 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/pal2rgb.c +438 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/ppm2tiff.c +397 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/raw2tiff.c +690 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/rgb2ycbcr.c +397 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/thumbnail.c +691 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiff2bw.c +501 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiff2pdf.c +5594 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiff2ps.c +3106 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiff2rgba.c +569 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffcmp.c +659 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffcp.c +1913 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffcrop.c +9231 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffdither.c +347 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffdump.c +889 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffgt.c +486 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffinfo.c +488 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffinfoce.c +472 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffmedian.c +918 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffset.c +356 -0
- data/vendor/gitlab.com/libtiff/libtiff/tools/tiffsplit.c +305 -0
- metadata +692 -0
@@ -0,0 +1,411 @@
|
|
1
|
+
<HTML>
|
2
|
+
<HEAD>
|
3
|
+
<TITLE>
|
4
|
+
Changes in TIFF v4.0.7
|
5
|
+
</TITLE>
|
6
|
+
</HEAD>
|
7
|
+
|
8
|
+
<BODY BGCOLOR=white>
|
9
|
+
<FONT FACE="Helvetica, Arial, Sans">
|
10
|
+
|
11
|
+
<BASEFONT SIZE=4>
|
12
|
+
<B><FONT SIZE=+3>T</FONT>IFF <FONT SIZE=+2>C</FONT>HANGE <FONT SIZE=+2>I</FONT>NFORMATION</B>
|
13
|
+
<BASEFONT SIZE=3>
|
14
|
+
|
15
|
+
<UL>
|
16
|
+
<HR SIZE=4 WIDTH=65% ALIGN=left>
|
17
|
+
<B>Current Version</B>: v4.0.7<BR>
|
18
|
+
<B>Previous Version</B>: <A HREF=v4.0.6.html>v4.0.6</a><BR>
|
19
|
+
<B>Master FTP Site</B>: <A HREF="ftp://download.osgeo.org/libtiff">
|
20
|
+
download.osgeo.org</a>, directory pub/libtiff</A><BR>
|
21
|
+
<B>Master HTTP Site #1</B>: <A HREF="http://www.simplesystems.org/libtiff/">
|
22
|
+
http://www.simplesystems.org/libtiff/</a><BR>
|
23
|
+
<B>Master HTTP Site #2</B>: <A HREF="http://libtiff.maptools.org/">
|
24
|
+
http://libtiff.maptools.org/</a>
|
25
|
+
<HR SIZE=4 WIDTH=65% ALIGN=left>
|
26
|
+
</UL>
|
27
|
+
|
28
|
+
<P>
|
29
|
+
This document describes the changes made to the software between the
|
30
|
+
<I>previous</I> and <I>current</I> versions (see above). If you don't
|
31
|
+
find something listed here, then it was not done in this timeframe, or
|
32
|
+
it was not considered important enough to be mentioned. The following
|
33
|
+
information is located here:
|
34
|
+
<UL>
|
35
|
+
<LI><A HREF="#highlights">Major Changes</A>
|
36
|
+
<LI><A HREF="#configure">Changes in the software configuration</A>
|
37
|
+
<LI><A HREF="#libtiff">Changes in libtiff</A>
|
38
|
+
<LI><A HREF="#tools">Changes in the tools</A>
|
39
|
+
<LI><A HREF="#contrib">Changes in the contrib area</A>
|
40
|
+
</UL>
|
41
|
+
<p>
|
42
|
+
<P><HR WIDTH=65% ALIGN=left>
|
43
|
+
|
44
|
+
<!--------------------------------------------------------------------------->
|
45
|
+
|
46
|
+
<A NAME="highlights"><B><FONT SIZE=+3>M</FONT>AJOR CHANGES:</B></A>
|
47
|
+
|
48
|
+
<UL>
|
49
|
+
|
50
|
+
<LI> The libtiff tools bmp2tiff, gif2tiff, ras2tiff, sgi2tiff,
|
51
|
+
sgisv, and ycbcr are completely removed from the distribution.
|
52
|
+
These tools were written in the late 1980s and early 1990s for
|
53
|
+
test and demonstration purposes. In some cases the tools were
|
54
|
+
never updated to support updates to the file format, or the
|
55
|
+
file formats are now rarely used. In all cases these tools
|
56
|
+
increased the libtiff security and maintenance exposure beyond
|
57
|
+
the value offered by the tool.
|
58
|
+
|
59
|
+
</UL>
|
60
|
+
|
61
|
+
|
62
|
+
<P><HR WIDTH=65% ALIGN=left>
|
63
|
+
<!--------------------------------------------------------------------------->
|
64
|
+
|
65
|
+
<A NAME="configure"><B><FONT SIZE=+3>C</FONT>HANGES IN THE SOFTWARE CONFIGURATION:</B></A>
|
66
|
+
|
67
|
+
<UL>
|
68
|
+
|
69
|
+
<LI> None
|
70
|
+
|
71
|
+
</UL>
|
72
|
+
|
73
|
+
<P><HR WIDTH=65% ALIGN=left>
|
74
|
+
|
75
|
+
<!--------------------------------------------------------------------------->
|
76
|
+
|
77
|
+
<A NAME="libtiff"><B><FONT SIZE=+3>C</FONT>HANGES IN LIBTIFF:</B></A>
|
78
|
+
|
79
|
+
<UL>
|
80
|
+
|
81
|
+
<LI> libtiff/tif_dirread.c: in TIFFFetchNormalTag(), do not
|
82
|
+
dereference NULL pointer when values of tags with
|
83
|
+
TIFF_SETGET_C16_ASCII / TIFF_SETGET_C32_ASCII access are
|
84
|
+
0-byte arrays. Fixes
|
85
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2593 (regression
|
86
|
+
introduced by previous fix done on 2016-11-11 for
|
87
|
+
CVE-2016-9297). Reported by Henri Salo. Assigned as
|
88
|
+
CVE-2016-9448
|
89
|
+
|
90
|
+
<LI> libtiff/tif_aux.c: fix crash in TIFFVGetFieldDefaulted() when
|
91
|
+
requesting Predictor tag and that the zip/lzw codec is not
|
92
|
+
configured. Fixes
|
93
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2591
|
94
|
+
|
95
|
+
<LI> libtiff/tif_dirread.c: in TIFFFetchNormalTag(), make sure
|
96
|
+
that values of tags with TIFF_SETGET_C16_ASCII /
|
97
|
+
TIFF_SETGET_C32_ASCII access are null terminated, to avoid
|
98
|
+
potential read outside buffer in _TIFFPrintField(). Fixes
|
99
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2590
|
100
|
+
|
101
|
+
<LI> libtiff/tif_dirread.c: reject images with OJPEG compression
|
102
|
+
that have no TileOffsets/StripOffsets tag, when OJPEG
|
103
|
+
compression is disabled. Prevent null pointer dereference in
|
104
|
+
TIFFReadRawStrip1() and other functions that expect
|
105
|
+
td_stripbytecount to be non NULL. Fixes
|
106
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2585
|
107
|
+
|
108
|
+
<LI> libtiff/tif_strip.c: make TIFFNumberOfStrips() return the
|
109
|
+
td->td_nstrips value when it is non-zero, instead of
|
110
|
+
recomputing it. This is needed in TIFF_STRIPCHOP mode where
|
111
|
+
td_nstrips is modified. Fixes a read outsize of array in
|
112
|
+
tiffsplit (or other utilities using TIFFNumberOfStrips()).
|
113
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2587
|
114
|
+
(CVE-2016-9273)
|
115
|
+
|
116
|
+
<LI> libtiff/tif_predict.h, libtiff/tif_predict.c: Replace
|
117
|
+
assertions by runtime checks to avoid assertions in debug
|
118
|
+
mode, or buffer overflows in release mode. Can happen when
|
119
|
+
dealing with unusual tile size like YCbCr with
|
120
|
+
subsampling. Reported as MSVR 35105 by Axel Souchet & Vishal
|
121
|
+
Chauhan from the MSRC Vulnerabilities & Mitigations
|
122
|
+
|
123
|
+
<LI> libtiff/tif_dir.c: discard values of SMinSampleValue and
|
124
|
+
SMaxSampleValue when they have been read and the value of
|
125
|
+
SamplesPerPixel is changed afterwards (like when reading a
|
126
|
+
OJPEG compressed image with a missing SamplesPerPixel tag, and
|
127
|
+
whose photometric is RGB or YCbCr, forcing SamplesPerPixel
|
128
|
+
being 3). Otherwise when rewriting the directory (for example
|
129
|
+
with tiffset, we will expect 3 values whereas the array had
|
130
|
+
been allocated with just one), thus causing a out of bound
|
131
|
+
read access. Fixes
|
132
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2500
|
133
|
+
(CVE-2014-8127, duplicate: CVE-2016-3658)
|
134
|
+
|
135
|
+
<LI> libtiff/tif_dirwrite.c: avoid null pointer dereference on
|
136
|
+
td_stripoffset when writing directory, if FIELD_STRIPOFFSETS
|
137
|
+
was artificially set for a hack case in OJPEG case. Fixes
|
138
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2500
|
139
|
+
(CVE-2014-8127, duplicate: CVE-2016-3658)
|
140
|
+
|
141
|
+
<LI> libtiff/tif_getimage.c (TIFFRGBAImageOK): Reject attempts to
|
142
|
+
read floating point images.
|
143
|
+
|
144
|
+
<LI> libtiff/tif_predict.c (PredictorSetup): Enforce
|
145
|
+
bits-per-sample requirements of floating point predictor (3).
|
146
|
+
Fixes CVE-2016-3622 "Divide By Zero in the tiff2rgba tool."
|
147
|
+
|
148
|
+
<LI> libtiff/tif_pixarlog.c: fix out-of-bounds write vulnerabilities
|
149
|
+
in heap allocated buffers. Reported as MSVR 35094. Discovered by
|
150
|
+
Axel Souchet and Vishal Chauhan from the MSRC Vulnerabilities &
|
151
|
+
Mitigations team.
|
152
|
+
|
153
|
+
<LI> libtiff/tif_write.c: fix issue in error code path of
|
154
|
+
TIFFFlushData1() that didn't reset the tif_rawcc and tif_rawcp
|
155
|
+
members. I'm not completely sure if that could happen in
|
156
|
+
practice outside of the odd behaviour of t2p_seekproc() of
|
157
|
+
tiff2pdf). The report points that a better fix could be to
|
158
|
+
check the return value of TIFFFlushData1() in places where it
|
159
|
+
isn't done currently, but it seems this patch is enough.
|
160
|
+
Reported as MSVR 35095. Discovered by Axel Souchet & Vishal
|
161
|
+
Chauhan & Suha Can from the MSRC Vulnerabilities & Mitigations
|
162
|
+
team.
|
163
|
+
|
164
|
+
<LI> libtiff/tif_pixarlog.c: Fix write buffer overflow in
|
165
|
+
PixarLogEncode if more input samples are provided than
|
166
|
+
expected by PixarLogSetupEncode. Idea based on
|
167
|
+
libtiff-CVE-2016-3990.patch from
|
168
|
+
libtiff-4.0.3-25.el7_2.src.rpm by Nikola Forro, but with
|
169
|
+
different and simpler check. (bugzilla #2544)
|
170
|
+
|
171
|
+
<LI> libtiff/tif_read.c: Fix out-of-bounds read on memory-mapped
|
172
|
+
files in TIFFReadRawStrip1() and TIFFReadRawTile1() when
|
173
|
+
stripoffset is beyond tmsize_t max value (reported by Mathias
|
174
|
+
Svensson)
|
175
|
+
|
176
|
+
<LI> libtiff/tif_read.c: make TIFFReadEncodedStrip() and
|
177
|
+
TIFFReadEncodedTile() directly use user provided buffer when
|
178
|
+
no compression (and other conditions) to save a memcpy()
|
179
|
+
|
180
|
+
<LI> libtiff/tif_write.c: make TIFFWriteEncodedStrip() and
|
181
|
+
TIFFWriteEncodedTile() directly use user provided buffer when
|
182
|
+
no compression to save a memcpy().
|
183
|
+
|
184
|
+
<LI> libtiff/tif_luv.c: validate that for COMPRESSION_SGILOG and
|
185
|
+
PHOTOMETRIC_LOGL, there is only one sample per pixel. Avoid
|
186
|
+
potential invalid memory write on corrupted/unexpected images
|
187
|
+
when using the TIFFRGBAImageBegin() interface (reported by
|
188
|
+
Clay Wood)
|
189
|
+
|
190
|
+
<LI> libtiff/tif_pixarlog.c: fix potential buffer write overrun in
|
191
|
+
PixarLogDecode() on corrupted/unexpected images (reported by
|
192
|
+
Mathias Svensson) (CVE-2016-5875)
|
193
|
+
|
194
|
+
<LI> libtiff/libtiff.def: Added _TIFFMultiply32 and
|
195
|
+
_TIFFMultiply64 to libtiff.def
|
196
|
+
|
197
|
+
<LI> libtiff/tif_config.vc.h (HAVE_SNPRINTF): Add a '1' to the
|
198
|
+
HAVE_SNPRINTF definition.
|
199
|
+
|
200
|
+
<LI> libtiff/tif_config.vc.h (HAVE_SNPRINTF): Applied patch by
|
201
|
+
Edward Lam to define HAVE_SNPRINTF for Visual Studio 2015.
|
202
|
+
|
203
|
+
<LI> libtiff/tif_dirread.c: when compiled with DEFER_STRILE_LOAD,
|
204
|
+
fix regression, introduced on 2014-12-23, when reading a
|
205
|
+
one-strip file without a StripByteCounts tag. GDAL #6490
|
206
|
+
|
207
|
+
<LI> libtiff/*: upstream typo fixes (mostly contributed by Kurt
|
208
|
+
Schwehr) coming from GDAL internal libtiff
|
209
|
+
|
210
|
+
<LI> libtiff/tif_fax3.h: make Param member of TIFFFaxTabEnt
|
211
|
+
structure a uint16 to reduce size of the binary.
|
212
|
+
|
213
|
+
<LI> libtiff/tif_read.c, tif_dirread.c: fix indentation issues
|
214
|
+
raised by GCC 6 -Wmisleading-indentation
|
215
|
+
|
216
|
+
<LI> libtiff/tif_pixarlog.c: avoid zlib error messages to pass a
|
217
|
+
NULL string to %s formatter, which is undefined behaviour in
|
218
|
+
sprintf().
|
219
|
+
|
220
|
+
<LI> libtiff/tif_next.c: fix potential out-of-bound write in NeXTDecode()
|
221
|
+
triggered by http://lcamtuf.coredump.cx/afl/vulns/libtiff5.tif
|
222
|
+
(bugzilla #2508)
|
223
|
+
|
224
|
+
<LI> libtiff/tif_luv.c: fix potential out-of-bound writes in
|
225
|
+
decode functions in non debug builds by replacing assert()s by
|
226
|
+
regular if checks (bugzilla #2522). Fix potential
|
227
|
+
out-of-bound reads in case of short input data.
|
228
|
+
|
229
|
+
<LI> libtiff/tif_getimage.c: fix out-of-bound reads in
|
230
|
+
TIFFRGBAImage interface in case of unsupported values of
|
231
|
+
SamplesPerPixel/ExtraSamples for LogLUV / CIELab. Add explicit
|
232
|
+
call to TIFFRGBAImageOK() in TIFFRGBAImageBegin(). Fix
|
233
|
+
CVE-2015-8665 reported by limingxing and CVE-2015-8683
|
234
|
+
reported by zzf of Alibaba.
|
235
|
+
|
236
|
+
<LI> libtiff/tif_dirread.c: workaround false positive warning of
|
237
|
+
Clang Static Analyzer about null pointer dereference in
|
238
|
+
TIFFCheckDirOffset().
|
239
|
+
|
240
|
+
<LI> libtiff/tif_fax3.c: remove dead assignment in
|
241
|
+
Fax3PutEOLgdal(). Found by Clang Static Analyzer
|
242
|
+
|
243
|
+
<LI> libtiff/tif_dirwrite.c: fix truncation to 32 bit of file
|
244
|
+
offsets in TIFFLinkDirectory() and TIFFWriteDirectorySec()
|
245
|
+
when aligning directory offsets on a even offset (affects
|
246
|
+
BigTIFF). This was a regression of the changeset of
|
247
|
+
2015-10-19.
|
248
|
+
|
249
|
+
<LI> libtiff/tif_write.c: TIFFWriteEncodedStrip() and
|
250
|
+
TIFFWriteEncodedTile() should return -1 in case of failure of
|
251
|
+
tif_encodestrip() as documented
|
252
|
+
|
253
|
+
<LI> libtiff/tif_dumpmode.c: DumpModeEncode() should return 0 in
|
254
|
+
case of failure so that the above mentionned functions detect
|
255
|
+
the error.
|
256
|
+
|
257
|
+
<LI> libtiff/*.c: fix MSVC warnings related to cast shortening and
|
258
|
+
assignment within conditional expression
|
259
|
+
|
260
|
+
<LI> libtiff/*.c: fix clang -Wshorten-64-to-32 warnings
|
261
|
+
|
262
|
+
<LI> libtiff/tif_dirread.c: prevent reading ColorMap or
|
263
|
+
TransferFunction if BitsPerPixel > 24, so as to avoid huge
|
264
|
+
memory allocation and file read attempts
|
265
|
+
|
266
|
+
<LI> libtiff/tif_dirread.c: remove duplicated assignment (reported
|
267
|
+
by Clang static analyzer)
|
268
|
+
|
269
|
+
<LI> libtiff/tif_dir.c, libtiff/tif_dirinfo.c,
|
270
|
+
libtiff/tif_compress.c, libtiff/tif_jpeg_12.c: suppress
|
271
|
+
warnings about 'no previous declaration/prototype'
|
272
|
+
|
273
|
+
<LI> libtiff/tiffiop.h, libtiff/tif_dirwrite.c: suffix constants
|
274
|
+
by U to fix 'warning: negative integer implicitly converted to
|
275
|
+
unsigned type' warning (part of -Wconversion)
|
276
|
+
|
277
|
+
<LI> libtiff/tif_dir.c, libtiff/tif_dirread.c,
|
278
|
+
libtiff/tif_getimage.c, libtiff/tif_print.c: fix -Wshadow
|
279
|
+
warnings (only in libtiff/)
|
280
|
+
|
281
|
+
</UL>
|
282
|
+
|
283
|
+
<P><HR WIDTH=65% ALIGN=left>
|
284
|
+
|
285
|
+
<!-------------------------------------------------------------------------->
|
286
|
+
|
287
|
+
<A NAME="tools"><B><FONT SIZE=+3>C</FONT>HANGES IN THE TOOLS:</B></A>
|
288
|
+
|
289
|
+
<UL>
|
290
|
+
|
291
|
+
<LI> tools/Makefile.am: The libtiff tools bmp2tiff, gif2tiff,
|
292
|
+
ras2tiff, sgi2tiff, sgisv, and ycbcr are completely removed
|
293
|
+
from the distribution. The libtiff tools rgb2ycbcr and
|
294
|
+
thumbnail are only built in the build tree for testing. Old
|
295
|
+
files are put in new 'archive' subdirectory of the source
|
296
|
+
repository, but not in distribution archives. These changes
|
297
|
+
are made in order to lessen the maintenance burden.
|
298
|
+
|
299
|
+
<LI> tools/tiff2pdf.c: avoid undefined behaviour related to
|
300
|
+
overlapping of source and destination buffer in memcpy() call
|
301
|
+
in t2p_sample_rgbaa_to_rgb() Fixes
|
302
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2577
|
303
|
+
|
304
|
+
<LI> tools/tiff2pdf.c: fix potential integer overflows on 32 bit
|
305
|
+
builds in t2p_read_tiff_size() Fixes
|
306
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2576
|
307
|
+
|
308
|
+
<LI> tools/fax2tiff.c: fix segfault when specifying -r without
|
309
|
+
argument. Patch by Yuriy M. Kaminskiy. Fixes
|
310
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2572
|
311
|
+
|
312
|
+
<LI> tools/tiffinfo.c: fix out-of-bound read on some tiled images.
|
313
|
+
(http://bugzilla.maptools.org/show_bug.cgi?id=2517)
|
314
|
+
|
315
|
+
<LI> tools/tiffcrop.c: fix multiple uint32 overflows in
|
316
|
+
writeBufferToSeparateStrips(), writeBufferToContigTiles() and
|
317
|
+
writeBufferToSeparateTiles() that could cause heap buffer
|
318
|
+
overflows. Reported by Henri Salo from Nixu Corporation.
|
319
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2592
|
320
|
+
|
321
|
+
<LI> tools/tiffcrop.c: fix out-of-bound read of up to 3 bytes in
|
322
|
+
readContigTilesIntoBuffer(). Reported as MSVR 35092 by Axel
|
323
|
+
Souchet & Vishal Chauhan from the MSRC Vulnerabilities &
|
324
|
+
Mitigations team.
|
325
|
+
|
326
|
+
<LI> tools/tiff2pdf.c: fix write buffer overflow of 2 bytes on
|
327
|
+
JPEG compressed images. Reported by Tyler Bohan of Cisco Talos
|
328
|
+
as TALOS-CAN-0187 / CVE-2016-5652. Also prevents writing 2
|
329
|
+
extra uninitialized bytes to the file stream.
|
330
|
+
|
331
|
+
<LI> tools/tiffcp.c: fix out-of-bounds write on tiled images with odd
|
332
|
+
tile width vs image width. Reported as MSVR 35103
|
333
|
+
by Axel Souchet and Vishal Chauhan from the MSRC Vulnerabilities &
|
334
|
+
Mitigations team.
|
335
|
+
|
336
|
+
<LI> tools/tiff2pdf.c: fix read -largely- outsize of buffer in
|
337
|
+
t2p_readwrite_pdf_image_tile(), causing crash, when reading a
|
338
|
+
JPEG compressed image with TIFFTAG_JPEGTABLES length being
|
339
|
+
one. Reported as MSVR 35101 by Axel Souchet and Vishal
|
340
|
+
Chauhan from the MSRC Vulnerabilities & Mitigations team.
|
341
|
+
|
342
|
+
<LI> tools/tiffcp.c: fix read of undefined variable in case of
|
343
|
+
missing required tags. Found on test case of MSVR 35100.
|
344
|
+
|
345
|
+
<LI> tools/tiffcrop.c: fix read of undefined buffer in
|
346
|
+
readContigStripsIntoBuffer() due to uint16 overflow. Probably
|
347
|
+
not a security issue but I can be wrong. Reported as MSVR
|
348
|
+
35100 by Axel Souchet from the MSRC Vulnerabilities &
|
349
|
+
Mitigations team.
|
350
|
+
|
351
|
+
<LI> tools/tiffcrop.c: fix various out-of-bounds write
|
352
|
+
vulnerabilities in heap or stack allocated buffers. Reported
|
353
|
+
as MSVR 35093, MSVR 35096 and MSVR 35097. Discovered by Axel
|
354
|
+
Souchet and Vishal Chauhan from the MSRC Vulnerabilities &
|
355
|
+
Mitigations team.
|
356
|
+
|
357
|
+
<LI> tools/tiff2pdf.c: fix out-of-bounds write vulnerabilities in
|
358
|
+
heap allocate buffer in t2p_process_jpeg_strip(). Reported as
|
359
|
+
MSVR 35098. Discovered by Axel Souchet and Vishal Chauhan from
|
360
|
+
the MSRC Vulnerabilities & Mitigations team.
|
361
|
+
|
362
|
+
<LI> tools/tiff2bw.c: fix weight computation that could result of
|
363
|
+
color value overflow (no security implication). Fix bugzilla
|
364
|
+
#2550. Patch by Frank Freudenberg.
|
365
|
+
|
366
|
+
<LI> tools/rgb2ycbcr.c: validate values of -v and -h parameters to
|
367
|
+
avoid potential divide by zero. Fixes CVE-2016-3623 (bugzilla #2569)
|
368
|
+
|
369
|
+
<LI> tools/tiffcrop.c: Fix out-of-bounds write in loadImage().
|
370
|
+
From patch libtiff-CVE-2016-3991.patch from
|
371
|
+
libtiff-4.0.3-25.el7_2.src.rpm by Nikola Forro (bugzilla
|
372
|
+
#2543)
|
373
|
+
|
374
|
+
<LI> tools/tiff2rgba.c: Fix integer overflow in size of allocated
|
375
|
+
buffer, when -b mode is enabled, that could result in
|
376
|
+
out-of-bounds write. Based initially on patch
|
377
|
+
tiff-CVE-2016-3945.patch from libtiff-4.0.3-25.el7_2.src.rpm
|
378
|
+
by Nikola Forro, with correction for invalid tests that
|
379
|
+
rejected valid files. (bugzilla #2545)
|
380
|
+
|
381
|
+
<LI> tools/tiffcrop.c: Avoid access outside of stack allocated
|
382
|
+
array on a tiled separate TIFF with more than 8 samples per
|
383
|
+
pixel. Reported by Kaixiang Zhang of the Cloud Security Team,
|
384
|
+
Qihoo 360 (CVE-2016-5321 / CVE-2016-5323 , bugzilla #2558 /
|
385
|
+
#2559)
|
386
|
+
|
387
|
+
<LI> tools/tiffdump.c: fix a few misaligned 64-bit reads warned by
|
388
|
+
-fsanitize
|
389
|
+
|
390
|
+
<LI> tools/tiffdump.c (ReadDirectory): Remove uint32 cast to
|
391
|
+
_TIFFmalloc() argument which resulted in Coverity report.
|
392
|
+
Added more mutiplication overflow checks.
|
393
|
+
|
394
|
+
</UL>
|
395
|
+
|
396
|
+
<P><HR WIDTH=65% ALIGN=left>
|
397
|
+
|
398
|
+
<!--------------------------------------------------------------------------->
|
399
|
+
|
400
|
+
<A NAME="contrib"><B><FONT SIZE=+3>C</FONT>HANGES IN THE CONTRIB AREA:</B></A>
|
401
|
+
|
402
|
+
<UL>
|
403
|
+
|
404
|
+
<LI> None
|
405
|
+
|
406
|
+
</UL>
|
407
|
+
|
408
|
+
Last updated $Date: 2016-11-19 17:47:40 $.
|
409
|
+
|
410
|
+
</BODY>
|
411
|
+
</HTML>
|
@@ -0,0 +1,445 @@
|
|
1
|
+
<HTML>
|
2
|
+
<HEAD>
|
3
|
+
<TITLE>
|
4
|
+
Changes in TIFF v4.0.8
|
5
|
+
</TITLE>
|
6
|
+
</HEAD>
|
7
|
+
|
8
|
+
<BODY BGCOLOR=white>
|
9
|
+
<FONT FACE="Helvetica, Arial, Sans">
|
10
|
+
|
11
|
+
<BASEFONT SIZE=4>
|
12
|
+
<B><FONT SIZE=+3>T</FONT>IFF <FONT SIZE=+2>C</FONT>HANGE <FONT SIZE=+2>I</FONT>NFORMATION</B>
|
13
|
+
<BASEFONT SIZE=3>
|
14
|
+
|
15
|
+
<UL>
|
16
|
+
<HR SIZE=4 WIDTH=65% ALIGN=left>
|
17
|
+
<B>Current Version</B>: v4.0.8<BR>
|
18
|
+
<B>Previous Version</B>: <A HREF=v4.0.7.html>v4.0.7</a><BR>
|
19
|
+
<B>Master FTP Site</B>: <A HREF="ftp://download.osgeo.org/libtiff">
|
20
|
+
download.osgeo.org</a>, directory pub/libtiff</A><BR>
|
21
|
+
<B>Master HTTP Site #1</B>: <A HREF="http://www.simplesystems.org/libtiff/">
|
22
|
+
http://www.simplesystems.org/libtiff/</a><BR>
|
23
|
+
<B>Master HTTP Site #2</B>: <A HREF="http://libtiff.maptools.org/">
|
24
|
+
http://libtiff.maptools.org/</a>
|
25
|
+
<HR SIZE=4 WIDTH=65% ALIGN=left>
|
26
|
+
</UL>
|
27
|
+
|
28
|
+
<P>
|
29
|
+
This document describes the changes made to the software between the
|
30
|
+
<I>previous</I> and <I>current</I> versions (see above). If you don't
|
31
|
+
find something listed here, then it was not done in this timeframe, or
|
32
|
+
it was not considered important enough to be mentioned. The following
|
33
|
+
information is located here:
|
34
|
+
<UL>
|
35
|
+
<LI><A HREF="#highlights">Major Changes</A>
|
36
|
+
<LI><A HREF="#configure">Changes in the software configuration</A>
|
37
|
+
<LI><A HREF="#libtiff">Changes in libtiff</A>
|
38
|
+
<LI><A HREF="#tools">Changes in the tools</A>
|
39
|
+
<LI><A HREF="#contrib">Changes in the contrib area</A>
|
40
|
+
</UL>
|
41
|
+
<p>
|
42
|
+
<P><HR WIDTH=65% ALIGN=left>
|
43
|
+
|
44
|
+
<!--------------------------------------------------------------------------->
|
45
|
+
|
46
|
+
<A NAME="highlights"><B><FONT SIZE=+3>M</FONT>AJOR CHANGES:</B></A>
|
47
|
+
|
48
|
+
<UL>
|
49
|
+
|
50
|
+
<LI> None
|
51
|
+
|
52
|
+
</UL>
|
53
|
+
|
54
|
+
|
55
|
+
<P><HR WIDTH=65% ALIGN=left>
|
56
|
+
<!--------------------------------------------------------------------------->
|
57
|
+
|
58
|
+
<A NAME="configure"><B><FONT SIZE=+3>C</FONT>HANGES IN THE SOFTWARE CONFIGURATION:</B></A>
|
59
|
+
|
60
|
+
<UL>
|
61
|
+
|
62
|
+
<LI> None
|
63
|
+
|
64
|
+
</UL>
|
65
|
+
|
66
|
+
<P><HR WIDTH=65% ALIGN=left>
|
67
|
+
|
68
|
+
<!--------------------------------------------------------------------------->
|
69
|
+
|
70
|
+
<A NAME="libtiff"><B><FONT SIZE=+3>C</FONT>HANGES IN LIBTIFF:</B></A>
|
71
|
+
|
72
|
+
<UL>
|
73
|
+
|
74
|
+
<LI> libtiff/tif_getimage.c, libtiff/tif_open.c: add parenthesis
|
75
|
+
to fix cppcheck clarifyCalculation warnings *
|
76
|
+
libtiff/tif_predict.c, libtiff/tif_print.c: fix printf
|
77
|
+
unsigned vs signed formatting (cppcheck
|
78
|
+
invalidPrintfArgType_uint warnings)
|
79
|
+
|
80
|
+
<LI> libtiff/tif_read.c, libtiff/tiffiop.h: fix uint32 overflow in
|
81
|
+
TIFFReadEncodedStrip() that caused an integer division by
|
82
|
+
zero. Reported by Agostino Sarubbo. Fixes
|
83
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2596
|
84
|
+
|
85
|
+
<LI> libtiff/tif_pixarlog.c, libtiff/tif_luv.c: fix heap-based
|
86
|
+
buffer overflow on generation of PixarLog / LUV compressed
|
87
|
+
files, with ColorMap, TransferFunction attached and nasty
|
88
|
+
plays with bitspersample. The fix for LUV has not been
|
89
|
+
tested, but suffers from the same kind of issue of PixarLog.
|
90
|
+
Reported by Agostino Sarubbo. Fixes
|
91
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2604
|
92
|
+
|
93
|
+
<LI> libtiff/tif_strip.c: revert the change in
|
94
|
+
TIFFNumberOfStrips() done for
|
95
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2587 /
|
96
|
+
CVE-2016-9273 since the above change is a better fix that
|
97
|
+
makes it unnecessary.
|
98
|
+
|
99
|
+
<LI> libtiff/tif_dirread.c: modify ChopUpSingleUncompressedStrip()
|
100
|
+
to instanciate compute ntrips as
|
101
|
+
TIFFhowmany_32(td->td_imagelength, rowsperstrip), instead of a
|
102
|
+
logic based on the total size of data. Which is faulty is the
|
103
|
+
total size of data is not sufficient to fill the whole image,
|
104
|
+
and thus results in reading outside of the
|
105
|
+
StripByCounts/StripOffsets arrays when using
|
106
|
+
TIFFReadScanline(). Reported by Agostino Sarubbo. Fixes
|
107
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2608.
|
108
|
+
|
109
|
+
<LI> libtiff/tif_ojpeg.c: make OJPEGDecode() early exit in case of
|
110
|
+
failure in OJPEGPreDecode(). This will avoid a divide by zero,
|
111
|
+
and potential other issues. Reported by Agostino Sarubbo.
|
112
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2611
|
113
|
+
|
114
|
+
<LI> libtiff/tif_write.c: fix misleading indentation as warned by GCC.
|
115
|
+
|
116
|
+
|
117
|
+
<LI> libtiff/tif_fax3.h: revert change done on 2016-01-09 that
|
118
|
+
made Param member of TIFFFaxTabEnt structure a uint16 to
|
119
|
+
reduce size of the binary. It happens that the Hylafax
|
120
|
+
software uses the tables that follow this typedef
|
121
|
+
(TIFFFaxMainTable, TIFFFaxWhiteTable, TIFFFaxBlackTable),
|
122
|
+
although they are not in a public libtiff header. Raised by
|
123
|
+
Lee Howard. Fixes
|
124
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2636
|
125
|
+
|
126
|
+
<LI> libtiff/tiffio.h, libtiff/tif_getimage.c: add
|
127
|
+
TIFFReadRGBAStripExt() and TIFFReadRGBATileExt() variants of
|
128
|
+
the functions without ext, with an extra argument to control
|
129
|
+
the stop_on_error behaviour.
|
130
|
+
|
131
|
+
<LI> libtiff/tif_getimage.c: fix potential memory leaks in error
|
132
|
+
code path of TIFFRGBAImageBegin(). Fixes
|
133
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2627
|
134
|
+
|
135
|
+
<LI> libtiff/tif_jpeg.c: increase libjpeg max memory usable to 10
|
136
|
+
MB instead of libjpeg 1MB default. This helps when creating
|
137
|
+
files with "big" tile, without using libjpeg temporary files.
|
138
|
+
Related to https://trac.osgeo.org/gdal/ticket/6757
|
139
|
+
|
140
|
+
<LI> libtiff/tif_jpeg.c: avoid integer division by zero in
|
141
|
+
JPEGSetupEncode() when horizontal or vertical sampling is set
|
142
|
+
to 0. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2653
|
143
|
+
|
144
|
+
<LI> libtiff/tif_dirwrite.c: in
|
145
|
+
TIFFWriteDirectoryTagCheckedRational, replace assertion by
|
146
|
+
runtime check to error out if passed value is strictly
|
147
|
+
negative. Fixes
|
148
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2535
|
149
|
+
|
150
|
+
<LI> libtiff/tif_dirread.c: avoid division by floating point 0 in
|
151
|
+
TIFFReadDirEntryCheckedRational() and
|
152
|
+
TIFFReadDirEntryCheckedSrational(), and return 0 in that case
|
153
|
+
(instead of infinity as before presumably) Apparently some
|
154
|
+
sanitizers do not like those divisions by zero. Fixes
|
155
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2644
|
156
|
+
|
157
|
+
<LI> libtiff/tif_dir.c, tif_dirread.c, tif_dirwrite.c: implement
|
158
|
+
various clampings of double to other data types to avoid
|
159
|
+
undefined behaviour if the output range isn't big enough to
|
160
|
+
hold the input value. Fixes
|
161
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2643
|
162
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2642
|
163
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2646
|
164
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2647
|
165
|
+
|
166
|
+
<LI> libtiff/tif_jpeg.c: validate BitsPerSample in
|
167
|
+
JPEGSetupEncode() to avoid undefined behaviour caused by
|
168
|
+
invalid shift exponent. Fixes
|
169
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2648
|
170
|
+
|
171
|
+
<LI> libtiff/tif_read.c: avoid potential undefined behaviour on
|
172
|
+
signed integer addition in TIFFReadRawStrip1() in isMapped()
|
173
|
+
case. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2650
|
174
|
+
|
175
|
+
<LI> libtiff/tif_getimage.c: add explicit uint32 cast in
|
176
|
+
putagreytile to avoid UndefinedBehaviorSanitizer warning.
|
177
|
+
Patch by Nicolás Peña. Fixes
|
178
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2658
|
179
|
+
|
180
|
+
<LI> libtiff/tif_read.c: TIFFReadBufferSetup(): use _TIFFcalloc()
|
181
|
+
to zero initialize tif_rawdata. Fixes
|
182
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2651
|
183
|
+
|
184
|
+
<LI> libtiff/tiffio.h, tif_unix.c, tif_win32.c, tif_vms.c: add
|
185
|
+
_TIFFcalloc()
|
186
|
+
|
187
|
+
<LI> libtiff/tif_luv.c, tif_lzw.c, tif_packbits.c: return 0 in
|
188
|
+
Encode functions instead of -1 when TIFFFlushData1() fails.
|
189
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2130
|
190
|
+
|
191
|
+
<LI> libtiff/tif_ojpeg.c: fix leak in
|
192
|
+
OJPEGReadHeaderInfoSecTablesQTable,
|
193
|
+
OJPEGReadHeaderInfoSecTablesDcTable and
|
194
|
+
OJPEGReadHeaderInfoSecTablesAcTable when read fails. Patch by
|
195
|
+
Nicolás Peña. Fixes
|
196
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2659
|
197
|
+
|
198
|
+
<LI> libtiff/tif_jpeg.c: only run JPEGFixupTagsSubsampling() if
|
199
|
+
the YCbCrSubsampling tag is not explicitly present. This helps
|
200
|
+
a bit to reduce the I/O amount when the tag is present
|
201
|
+
(especially on cloud hosted files).
|
202
|
+
|
203
|
+
<LI> libtiff/tif_lzw.c: in LZWPostEncode(), increase, if
|
204
|
+
necessary, the code bit-width after flushing the remaining
|
205
|
+
code and before emitting the EOI code. Fixes
|
206
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=1982
|
207
|
+
|
208
|
+
<LI> libtiff/tif_pixarlog.c: fix memory leak in error code path of
|
209
|
+
PixarLogSetupDecode(). Patch by Nicolás Peña. Fixes
|
210
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2665
|
211
|
+
|
212
|
+
<LI> libtiff/tif_fax3.c, tif_predict.c, tif_getimage.c: fix GCC 7
|
213
|
+
-Wimplicit-fallthrough warnings.
|
214
|
+
|
215
|
+
<LI> libtiff/tif_dirread.c: fix memory leak in non
|
216
|
+
DEFER_STRILE_LOAD mode (ie default) when there is both a
|
217
|
+
StripOffsets and TileOffsets tag, or a StripByteCounts and
|
218
|
+
TileByteCounts Fixes
|
219
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2689
|
220
|
+
|
221
|
+
<LI> libtiff/tif_ojpeg.c: fix potential memory leak in
|
222
|
+
OJPEGReadHeaderInfoSecTablesQTable,
|
223
|
+
OJPEGReadHeaderInfoSecTablesDcTable and
|
224
|
+
OJPEGReadHeaderInfoSecTablesAcTable Patch by Nicolás Peña.
|
225
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2670
|
226
|
+
|
227
|
+
<LI> libtiff/tif_fax3.c: avoid crash in Fax3Close() on empty file.
|
228
|
+
Patch by Alan Coopersmith + complement by myself. Fixes
|
229
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2673
|
230
|
+
|
231
|
+
<LI> libtiff/tif_read.c: TIFFFillStrip(): add limitation to the
|
232
|
+
number of bytes read in case td_stripbytecount[strip] is
|
233
|
+
bigger than reasonable, so as to avoid excessive memory
|
234
|
+
allocation.
|
235
|
+
|
236
|
+
<LI> libtiff/tif_zip.c, tif_pixarlog.c, tif_predict.c: fix memory
|
237
|
+
leak when the underlying codec (ZIP, PixarLog) succeeds its
|
238
|
+
setupdecode() method, but PredictorSetup fails. Credit to
|
239
|
+
OSS-Fuzz (locally run, on GDAL)
|
240
|
+
|
241
|
+
<LI> libtiff/tif_read.c: TIFFFillStrip() and TIFFFillTile(): avoid
|
242
|
+
excessive memory allocation in case of shorten files. Only
|
243
|
+
effective on 64 bit builds and non-mapped cases. Credit to
|
244
|
+
OSS-Fuzz (locally run, on GDAL)
|
245
|
+
|
246
|
+
<LI> libtiff/tif_read.c: TIFFFillStripPartial() / TIFFSeek(),
|
247
|
+
avoid potential integer overflows with read_ahead in
|
248
|
+
CHUNKY_STRIP_READ_SUPPORT mode. Should
|
249
|
+
especially occur on 32 bit platforms.
|
250
|
+
|
251
|
+
<LI> libtiff/tif_read.c: TIFFFillStripPartial(): avoid excessive
|
252
|
+
memory allocation in case of shorten files. Only effective on
|
253
|
+
64 bit builds. Credit to OSS-Fuzz (locally run, on GDAL)
|
254
|
+
|
255
|
+
<LI> libtiff/tif_read.c: update tif_rawcc in
|
256
|
+
CHUNKY_STRIP_READ_SUPPORT mode with tif_rawdataloaded when
|
257
|
+
calling TIFFStartStrip() or TIFFFillStripPartial(). This
|
258
|
+
avoids reading beyond tif_rawdata when bytecount >
|
259
|
+
tif_rawdatasize. Fixes
|
260
|
+
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1545.
|
261
|
+
Credit to OSS-Fuzz
|
262
|
+
|
263
|
+
<LI> libtiff/tif_color.c: avoid potential int32 overflow in
|
264
|
+
TIFFYCbCrToRGBInit() Fixes
|
265
|
+
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1533
|
266
|
+
Credit to OSS-Fuzz
|
267
|
+
|
268
|
+
<LI> libtiff/tif_pixarlog.c, tif_luv.c: avoid potential int32
|
269
|
+
overflows in multiply_ms() and add_ms(). Fixes
|
270
|
+
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1558
|
271
|
+
Credit to OSS-Fuzz
|
272
|
+
|
273
|
+
<LI> libtiff/tif_packbits.c: fix out-of-buffer read in
|
274
|
+
PackBitsDecode() Fixes
|
275
|
+
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1563
|
276
|
+
Credit to OSS-Fuzz
|
277
|
+
|
278
|
+
<LI> libtiff/tif_luv.c: LogL16InitState(): avoid excessive memory
|
279
|
+
allocation when RowsPerStrip tag is missing.
|
280
|
+
Credit to OSS-Fuzz (locally run, on GDAL)
|
281
|
+
|
282
|
+
<LI> libtiff/tif_lzw.c: update dec_bitsleft at beginning of
|
283
|
+
LZWDecode(), and update tif_rawcc at end of LZWDecode(). This
|
284
|
+
is needed to properly work with the latest chnges in
|
285
|
+
tif_read.c in CHUNKY_STRIP_READ_SUPPORT mode.
|
286
|
+
|
287
|
+
<LI> libtiff/tif_pixarlog.c: PixarLogDecode(): resync tif_rawcp
|
288
|
+
with next_in and tif_rawcc with avail_in at beginning and end
|
289
|
+
of function, similarly to what is done in LZWDecode(). Likely
|
290
|
+
needed so that it works properly with latest chnges in
|
291
|
+
tif_read.c in CHUNKY_STRIP_READ_SUPPORT mode. But untested...
|
292
|
+
|
293
|
+
<LI> libtiff/tif_getimage.c: initYCbCrConversion(): add basic
|
294
|
+
validation of luma and refBlackWhite coefficients (just check
|
295
|
+
they are not NaN for now), to avoid potential float to int
|
296
|
+
overflows. Fixes
|
297
|
+
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1663
|
298
|
+
Credit to OSS Fuzz
|
299
|
+
|
300
|
+
<LI> libtiff/tif_read.c: _TIFFVSetField(): fix outside range cast
|
301
|
+
of double to float. Credit to Google Autofuzz project
|
302
|
+
|
303
|
+
<LI> libtiff/tif_getimage.c: initYCbCrConversion(): check luma[1]
|
304
|
+
is not zero to avoid division by zero. Fixes
|
305
|
+
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1665
|
306
|
+
Credit to OSS Fuzz
|
307
|
+
|
308
|
+
<LI> libtiff/tif_read.c: _TIFFVSetField(): fix outside range cast
|
309
|
+
of double to float. Credit to Google Autofuzz project
|
310
|
+
|
311
|
+
<LI> libtiff/tif_getimage.c: initYCbCrConversion(): check luma[1]
|
312
|
+
is not zero to avoid division by zero. Fixes
|
313
|
+
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1665
|
314
|
+
Credit to OSS Fuzz
|
315
|
+
|
316
|
+
<LI> libtiff/tif_getimage.c: initYCbCrConversion(): stricter
|
317
|
+
validation for refBlackWhite coefficients values. To avoid
|
318
|
+
invalid float->int32 conversion. Fixes
|
319
|
+
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1718
|
320
|
+
Credit to OSS Fuzz
|
321
|
+
|
322
|
+
</UL>
|
323
|
+
|
324
|
+
<P><HR WIDTH=65% ALIGN=left>
|
325
|
+
|
326
|
+
<!-------------------------------------------------------------------------->
|
327
|
+
|
328
|
+
<A NAME="tools"><B><FONT SIZE=+3>C</FONT>HANGES IN THE TOOLS:</B></A>
|
329
|
+
|
330
|
+
<UL>
|
331
|
+
|
332
|
+
<LI> tools/fax2tiff.c (main): Applied patch by Jörg Ahrens to fix
|
333
|
+
passing client data for Win32 builds using tif_win32.c
|
334
|
+
(USE_WIN32_FILEIO defined) for file I/O. Patch was provided
|
335
|
+
via email on November 20, 2016.
|
336
|
+
|
337
|
+
<LI> tools/tiffcp.c: avoid uint32 underflow in cpDecodedStrips
|
338
|
+
that can cause various issues, such as buffer overflows in the
|
339
|
+
library. Reported by Agostino Sarubbo. Fixes
|
340
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2598
|
341
|
+
|
342
|
+
<LI> tools/tiffcrop.c: fix readContigStripsIntoBuffer() in -i
|
343
|
+
(ignore) mode so that the output buffer is correctly
|
344
|
+
incremented to avoid write outside bounds. Reported by
|
345
|
+
Agostino Sarubbo. Fixes
|
346
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2620
|
347
|
+
|
348
|
+
<LI> tools/tiffcrop.c: add 3 extra bytes at end of strip buffer in
|
349
|
+
readSeparateStripsIntoBuffer() to avoid read outside of heap
|
350
|
+
allocated buffer. Reported by Agostino Sarubbo. Fixes
|
351
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2621
|
352
|
+
|
353
|
+
<LI> tools/tiffcrop.c: fix integer division by zero when
|
354
|
+
BitsPerSample is missing. Reported by Agostino Sarubbo.
|
355
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2619
|
356
|
+
|
357
|
+
<LI> tools/tiffinfo.c: fix null pointer dereference in -r mode
|
358
|
+
when the image has no StripByteCount tag. Reported by
|
359
|
+
Agostino Sarubbo. Fixes
|
360
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2594
|
361
|
+
|
362
|
+
<LI> tools/tiffcp.c: avoid potential division by zero is
|
363
|
+
BitsPerSamples tag is missing. Reported by Agostino Sarubbo.
|
364
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2597
|
365
|
+
|
366
|
+
<LI> tools/tif_dir.c: when TIFFGetField(, TIFFTAG_NUMBEROFINKS, )
|
367
|
+
is called, limit the return number of inks to SamplesPerPixel,
|
368
|
+
so that code that parses ink names doesn't go past the end of
|
369
|
+
the buffer. Reported by Agostino Sarubbo. Fixes
|
370
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2599
|
371
|
+
|
372
|
+
<LI> tools/tiffcp.c: avoid potential division by zero is
|
373
|
+
BitsPerSamples tag is missing. Reported by Agostino Sarubbo.
|
374
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2607
|
375
|
+
|
376
|
+
<LI> tools/tiffcp.c: fix uint32 underflow/overflow that can cause
|
377
|
+
heap-based buffer overflow. Reported by Agostino Sarubbo.
|
378
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2610
|
379
|
+
|
380
|
+
<LI> tools/tiffcp.c: replace assert( (bps % 8) == 0 ) by a non
|
381
|
+
assert check. Reported by Agostino Sarubbo. Fixes
|
382
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2605
|
383
|
+
|
384
|
+
<LI> tools/tiff2ps.c: fix 2 heap-based buffer overflows (in
|
385
|
+
PSDataBW and PSDataColorContig). Reported by Agostino Sarubbo.
|
386
|
+
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2633 and
|
387
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2634.
|
388
|
+
|
389
|
+
<LI> tools/tiff2pdf.c: prevent heap-based buffer overflow in -j
|
390
|
+
mode on a paletted image. Note: this fix errors out before the
|
391
|
+
overflow happens. There could probably be a better fix. Fixes
|
392
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2635
|
393
|
+
|
394
|
+
<LI> tools/tiff2pdf.c: fix wrong usage of memcpy() that can
|
395
|
+
trigger unspecified behaviour. Fixes
|
396
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2638
|
397
|
+
|
398
|
+
<LI> tools/tiff2pdf.c: avoid potential invalid memory read in
|
399
|
+
t2p_writeproc. Fixes
|
400
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2639
|
401
|
+
|
402
|
+
<LI> tools/tiff2pdf.c: avoid potential heap-based overflow in
|
403
|
+
t2p_readwrite_pdf_image_tile(). Fixes
|
404
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2640
|
405
|
+
|
406
|
+
<LI> tools/tiffcrop.c: remove extraneous TIFFClose() in error code
|
407
|
+
path, that caused double free. Related to
|
408
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2535
|
409
|
+
|
410
|
+
<LI> tools/tiffcp.c: error out cleanly in cpContig2SeparateByRow
|
411
|
+
and cpSeparate2ContigByRow if BitsPerSample != 8 to avoid heap
|
412
|
+
based overflow. Fixes
|
413
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2656 and
|
414
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2657
|
415
|
+
|
416
|
+
<LI> tools/raw2tiff.c: avoid integer division by zero. Fixes
|
417
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2631
|
418
|
+
|
419
|
+
<LI> tools/tiff2ps.c: call TIFFClose() in error code paths.
|
420
|
+
|
421
|
+
<LI> tools/fax2tiff.c: emit appropriate message if the input file
|
422
|
+
is empty. Patch by Alan Coopersmith. Fixes
|
423
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2672
|
424
|
+
|
425
|
+
<LI> tools/tiff2bw.c: close TIFF handle in error code path. Fixes
|
426
|
+
http://bugzilla.maptools.org/show_bug.cgi?id=2677
|
427
|
+
|
428
|
+
</UL>
|
429
|
+
|
430
|
+
<P><HR WIDTH=65% ALIGN=left>
|
431
|
+
|
432
|
+
<!--------------------------------------------------------------------------->
|
433
|
+
|
434
|
+
<A NAME="contrib"><B><FONT SIZE=+3>C</FONT>HANGES IN THE CONTRIB AREA:</B></A>
|
435
|
+
|
436
|
+
<UL>
|
437
|
+
|
438
|
+
<LI> None
|
439
|
+
|
440
|
+
</UL>
|
441
|
+
|
442
|
+
Last updated $Date: 2017-05-21 17:47:46 $.
|
443
|
+
|
444
|
+
</BODY>
|
445
|
+
</HTML>
|