Package "libtiff-opengl"
  
    
    
        | Name: | libtiff-opengl | 
    
        | Description:
 | TIFF manipulation and conversion tools | 
    
        | Latest version: | 4.3.0-6ubuntu0.12 | 
    
        | Release: | jammy (22.04) | 
    
        | Level: | security | 
    
        | Repository: | universe | 
         
            | Head package: | tiff | 
        
            | Homepage: | https://libtiff.gitlab.io/libtiff/ | 
    
   
  
  
 
Links
    Download "libtiff-opengl"
    
Other versions of "libtiff-opengl" in Jammy
    
Changelog
    
    
    
        
        
    
    
        |   tiff (4.3.0-6ubuntu0.7) jammy-security; urgency=medium   * SECURITY UPDATE: denial of service
- debian/patches/CVE-2022-40090.patch: Improved IFD-Loop Handling.
 - CVE-2022-40090
 * SECURITY UPDATE: memory leak
 - debian/patches/CVE-2023-3576.patch: Fix memory leak in tiffcrop.c.
 - CVE-2023-3576
  -- Fabian Toepfer <email address hidden>  Thu, 23 Nov 2023 14:39:56 +0100 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2022-40090 | An issue was discovered in function TIFFReadDirectory libtiff before 4.4.0 allows attackers to cause a denial of service via crafted TIFF file. |  
                | CVE-2023-3576 | A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pa |  | 
    
    
    
    
    
        
        
    
    
        |   tiff (4.3.0-6ubuntu0.6) jammy-security; urgency=medium   * SECURITY UPDATE: out-of-bound read
- debian/patches/CVE-2023-1916.patch: Fix heap-buffer-overflow in
 function extractImageSection
 - CVE-2023-1916
  -- Nishit Majithia <email address hidden>  Tue, 10 Oct 2023 15:57:39 +0530 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2023-1916 | A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the ex |  | 
    
    
    
    
    
        
        
    
    
        |   tiff (4.3.0-6ubuntu0.5) jammy-security; urgency=medium   * SECURITY UPDATE: heap-based buffer overflow
- debian/patches/CVE-2022-48281.patch: correct simple copy paste error in
 tiffcrop.c.
 - CVE-2022-48281
 * SECURITY UPDATE: NULL pointer dereference
 - d/p/0001-countInkNamesString-fix-UndefinedBehaviorSanitizer-a.patch: Fix
 undefined behavior in tif_dir.c.
 - CVE-2023-2908
 * SECURITY UPDATE: NULL pointer dereference
 - d/p/0002-TIFFClose-avoid-NULL-pointer-dereferencing.-fix-515.patch: avoid
 NULL pointer dereferencing in tif_close.c.
 - CVE-2023-3316
 * SECURITY UPDATE: buffer overflow
 - d/p/0003-Consider-error-return-of-writeSelections.patch: Consider error
 return of writeSelections() in tiffcrop.c.
 - CVE-2023-3618
 * SECURITY UPDATE: heap-based buffer overflow
 - d/p/0004-tiffcrop-correctly-update-buffersize-after-rotateIma.patch:
 correctly update buffersize after rotateImage() and enlarge buffsize and
 check integer overflow within rotateImage() in tiffcrop.c.
 - CVE-2023-25433
 * SECURITY UPDATE: Use after free
 - d/p/0005-tiffcrop-Do-not-reuse-input-buffer-for-subsequent-im.patch: Do
 not reuse input buffer for subsequent images in tiffcrop.c.
 - CVE-2023-26965
 * SECURITY UPDATE: buffer overflow
 - d/p/0006-tif_luv-Check-and-correct-for-NaN-data-in-uv_encode.patch: Check
 and correct for NaN data in uv_encode() in tif_luv.c.
 - CVE-2023-26966
 * SECURITY UPDATE: Integer overflow
 - d/p/0007-tiffcp-fix-memory-corruption-overflow-on-hostile-ima.patch: fix
 memory corruption (overflow) in tiffcp.c.
 - CVE-2023-38288
 * SECURITY UPDATE: Integer overflow
 - d/p/0008-raw2tiff-fix-integer-overflow-and-bypass-of-the-chec.patch: fix
 integer overflow and bypass of the check in raw2tiff.c.
 - CVE-2023-38289
  -- Fabian Toepfer <email address hidden>  Mon, 07 Aug 2023 17:56:53 +0200 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2022-48281 | processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., "WRITE of size 307203") via a crafted TIFF |  
                | CVE-2023-2908 | A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tif |  
                | CVE-2023-3618 | A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in li |  
                | CVE-2023-25433 | libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop |  
                | CVE-2023-26965 | loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image. |  
                | CVE-2023-26966 | libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be b |  
                | CVE-2023-38288 | libtiff: integer overflow in tiffcp.c |  
                | CVE-2023-38289 | libtiff: potential integer overflow in raw2tiff.c |  | 
    
    
    
    
    
        
        
    
    
        |   tiff (4.3.0-6ubuntu0.4) jammy-security; urgency=medium   * SECURITY UPDATE: out-of-bounds reads
- debian/patches/CVE-2023-0795.patch: Amend rotateImage() not to toggle the
 input image width and length parameters when only cropped image sections
 are rotated in tiffcrop.c.
 - CVE-2023-0795
 - CVE-2023-0796
 - CVE-2023-0797
 - CVE-2023-0798
 - CVE-2023-0799
 * SECURITY UPDATE: out-of-bounds writes
 - debian/patches/CVE-2023-0800.patch: added check for assumption on
 composite images in tiffcrop.c.
 - CVE-2023-0800
 - CVE-2023-0801
 - CVE-2023-0802
 - CVE-2023-0803
 - CVE-2023-0804
  -- Fabian Toepfer <email address hidden>  Fri, 03 Mar 2023 17:17:55 +0100 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2023-0795 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via a crafted tiff file |  
                | CVE-2023-0796 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via a crafted tiff file |  
                | CVE-2023-0797 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921, allowing a |  
                | CVE-2023-0798 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via a crafted tiff file |  
                | CVE-2023-0799 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file |  
                | CVE-2023-0800 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via a crafted tiff fil |  
                | CVE-2023-0801 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6778, allowing |  
                | CVE-2023-0802 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff fil |  
                | CVE-2023-0803 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via a crafted tiff fil |  
                | CVE-2023-0804 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via a crafted tiff fil |  | 
    
    
    
    
    
        
        
    
    
        |   tiff (4.3.0-6ubuntu0.3) jammy-security; urgency=medium   * SECURITY UPDATE: unsigned integer overflow
- debian/patches/CVE-2022-3970.patch: adds size_t type casts in the
 TIFFReadRGBATile function in libtiff/tif_getimage.c.
 - CVE-2022-3970
  -- David Fernandez Gonzalez <email address hidden>  Thu, 01 Dec 2022 10:12:53 +0100 | 
    
        
        | 
                
                | CVE-2022-3970 | A vulnerability was found in LibTIFF. It has been classified as critical. This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getim |  | 
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates