View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/tiff
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/ubuntu/dsc 2019-08-19 11:15:16 UTC 2019-08-19
DSC file for 4.0.10+git190818-1

Author: Ubuntu Git Importer
Author Date: 2019-08-19 11:15:16 UTC

DSC file for 4.0.10+git190818-1

importer/debian/dsc 2019-08-19 10:44:50 UTC 2019-08-19
DSC file for 4.0.10+git190818-1

Author: Ubuntu Git Importer
Author Date: 2019-08-19 10:44:50 UTC

DSC file for 4.0.10+git190818-1

applied/debian/sid 2019-08-19 10:43:30 UTC 2019-08-19
Import patches-applied version 4.0.10+git190818-1 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-08-18 11:25:27 UTC

Import patches-applied version 4.0.10+git190818-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: ff00f7050e27bbbf41e1708245d9958569dfdf1e
Unapplied parent: 9c001310a62dcbd4b798bfd1d892a435bde9e173

New changelog entries:
  * Git snapshot, fixing the following security issues:
    - RGBA interface: fix integer overflow potentially causing write heap
      buffer overflow,
    - setByteArray(): avoid potential signed integer overflow.

ubuntu/eoan 2019-08-19 10:43:30 UTC 2019-08-19
Import patches-unapplied version 4.0.10+git190818-1 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-08-18 11:25:27 UTC

Import patches-unapplied version 4.0.10+git190818-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: a54649dcf75a2b689e9a98d16b5154081db51b5a

New changelog entries:
  * Git snapshot, fixing the following security issues:
    - RGBA interface: fix integer overflow potentially causing write heap
      buffer overflow,
    - setByteArray(): avoid potential signed integer overflow.

applied/ubuntu/eoan 2019-08-19 10:43:30 UTC 2019-08-19
Import patches-applied version 4.0.10+git190818-1 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-08-18 11:25:27 UTC

Import patches-applied version 4.0.10+git190818-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: ff00f7050e27bbbf41e1708245d9958569dfdf1e
Unapplied parent: 9c001310a62dcbd4b798bfd1d892a435bde9e173

New changelog entries:
  * Git snapshot, fixing the following security issues:
    - RGBA interface: fix integer overflow potentially causing write heap
      buffer overflow,
    - setByteArray(): avoid potential signed integer overflow.

applied/ubuntu/eoan-devel 2019-08-19 10:43:30 UTC 2019-08-19
Import patches-applied version 4.0.10+git190818-1 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-08-18 11:25:27 UTC

Import patches-applied version 4.0.10+git190818-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: ff00f7050e27bbbf41e1708245d9958569dfdf1e
Unapplied parent: 9c001310a62dcbd4b798bfd1d892a435bde9e173

New changelog entries:
  * Git snapshot, fixing the following security issues:
    - RGBA interface: fix integer overflow potentially causing write heap
      buffer overflow,
    - setByteArray(): avoid potential signed integer overflow.

debian/sid 2019-08-19 10:43:30 UTC 2019-08-19
Import patches-unapplied version 4.0.10+git190818-1 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-08-18 11:25:27 UTC

Import patches-unapplied version 4.0.10+git190818-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: a54649dcf75a2b689e9a98d16b5154081db51b5a

New changelog entries:
  * Git snapshot, fixing the following security issues:
    - RGBA interface: fix integer overflow potentially causing write heap
      buffer overflow,
    - setByteArray(): avoid potential signed integer overflow.

applied/ubuntu/devel 2019-08-19 10:43:30 UTC 2019-08-19
Import patches-applied version 4.0.10+git190818-1 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-08-18 11:25:27 UTC

Import patches-applied version 4.0.10+git190818-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: ff00f7050e27bbbf41e1708245d9958569dfdf1e
Unapplied parent: 9c001310a62dcbd4b798bfd1d892a435bde9e173

New changelog entries:
  * Git snapshot, fixing the following security issues:
    - RGBA interface: fix integer overflow potentially causing write heap
      buffer overflow,
    - setByteArray(): avoid potential signed integer overflow.

ubuntu/devel 2019-08-19 10:43:30 UTC 2019-08-19
Import patches-unapplied version 4.0.10+git190818-1 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-08-18 11:25:27 UTC

Import patches-unapplied version 4.0.10+git190818-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: a54649dcf75a2b689e9a98d16b5154081db51b5a

New changelog entries:
  * Git snapshot, fixing the following security issues:
    - RGBA interface: fix integer overflow potentially causing write heap
      buffer overflow,
    - setByteArray(): avoid potential signed integer overflow.

ubuntu/eoan-proposed 2019-08-19 10:43:30 UTC 2019-08-19
Import patches-unapplied version 4.0.10+git190818-1 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-08-18 11:25:27 UTC

Import patches-unapplied version 4.0.10+git190818-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: a54649dcf75a2b689e9a98d16b5154081db51b5a

New changelog entries:
  * Git snapshot, fixing the following security issues:
    - RGBA interface: fix integer overflow potentially causing write heap
      buffer overflow,
    - setByteArray(): avoid potential signed integer overflow.

applied/ubuntu/eoan-proposed 2019-08-19 10:43:30 UTC 2019-08-19
Import patches-applied version 4.0.10+git190818-1 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-08-18 11:25:27 UTC

Import patches-applied version 4.0.10+git190818-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: ff00f7050e27bbbf41e1708245d9958569dfdf1e
Unapplied parent: 9c001310a62dcbd4b798bfd1d892a435bde9e173

New changelog entries:
  * Git snapshot, fixing the following security issues:
    - RGBA interface: fix integer overflow potentially causing write heap
      buffer overflow,
    - setByteArray(): avoid potential signed integer overflow.

ubuntu/eoan-devel 2019-08-19 10:43:30 UTC 2019-08-19
Import patches-unapplied version 4.0.10+git190818-1 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-08-18 11:25:27 UTC

Import patches-unapplied version 4.0.10+git190818-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: a54649dcf75a2b689e9a98d16b5154081db51b5a

New changelog entries:
  * Git snapshot, fixing the following security issues:
    - RGBA interface: fix integer overflow potentially causing write heap
      buffer overflow,
    - setByteArray(): avoid potential signed integer overflow.

applied/ubuntu/bionic-devel 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-applied version 4.0.9-5ubuntu0.2 to applied/ubuntu/bionic-secu...

Author: Marc Deslauriers
Author Date: 2019-03-11 15:59:03 UTC

Import patches-applied version 4.0.9-5ubuntu0.2 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: c3de5b1852a7008b5888386ec0875a92869fc697
Unapplied parent: 105389509b6cc6f10a0b98aaa2ebb437f5c3b4cf

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

applied/ubuntu/xenial-devel 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-applied version 4.0.6-1ubuntu0.6 to applied/ubuntu/xenial-secu...

Author: Marc Deslauriers
Author Date: 2019-03-11 16:50:36 UTC

Import patches-applied version 4.0.6-1ubuntu0.6 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 65f5daa7500bc45b678155700c4925fd1563eed9
Unapplied parent: a44220b7c419e9502efa7c2ccf43523c76f19a98

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

ubuntu/trusty-devel 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-unapplied version 4.0.3-7ubuntu0.11 to ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2019-03-11 16:51:58 UTC

Import patches-unapplied version 4.0.3-7ubuntu0.11 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: f819a812aa1a9839ede6ac1a2e3f3a8b27b4216f

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

ubuntu/xenial-updates 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-unapplied version 4.0.6-1ubuntu0.6 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2019-03-11 16:50:36 UTC

Import patches-unapplied version 4.0.6-1ubuntu0.6 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: acece0f9dd47a93bdbd3e87d1604d399655daaf6

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

applied/ubuntu/cosmic-security 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-applied version 4.0.9-6ubuntu0.2 to applied/ubuntu/cosmic-secu...

Author: Marc Deslauriers
Author Date: 2019-03-11 15:10:30 UTC

Import patches-applied version 4.0.9-6ubuntu0.2 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 74d9abba4aa6a09cdb094d595d60e0f916b3f527
Unapplied parent: 8d81586cd53adf4d680f2f69cb817ec08fbefa01

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

applied/ubuntu/xenial-updates 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-applied version 4.0.6-1ubuntu0.6 to applied/ubuntu/xenial-secu...

Author: Marc Deslauriers
Author Date: 2019-03-11 16:50:36 UTC

Import patches-applied version 4.0.6-1ubuntu0.6 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 65f5daa7500bc45b678155700c4925fd1563eed9
Unapplied parent: a44220b7c419e9502efa7c2ccf43523c76f19a98

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

applied/ubuntu/xenial-security 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-applied version 4.0.6-1ubuntu0.6 to applied/ubuntu/xenial-secu...

Author: Marc Deslauriers
Author Date: 2019-03-11 16:50:36 UTC

Import patches-applied version 4.0.6-1ubuntu0.6 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 65f5daa7500bc45b678155700c4925fd1563eed9
Unapplied parent: a44220b7c419e9502efa7c2ccf43523c76f19a98

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

ubuntu/xenial-security 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-unapplied version 4.0.6-1ubuntu0.6 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2019-03-11 16:50:36 UTC

Import patches-unapplied version 4.0.6-1ubuntu0.6 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: acece0f9dd47a93bdbd3e87d1604d399655daaf6

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

ubuntu/cosmic-devel 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-unapplied version 4.0.9-6ubuntu0.2 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2019-03-11 15:10:30 UTC

Import patches-unapplied version 4.0.9-6ubuntu0.2 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 682f516d5bead73df9f8df2c7cc52f0b95071944

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

applied/ubuntu/cosmic-devel 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-applied version 4.0.9-6ubuntu0.2 to applied/ubuntu/cosmic-secu...

Author: Marc Deslauriers
Author Date: 2019-03-11 15:10:30 UTC

Import patches-applied version 4.0.9-6ubuntu0.2 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 74d9abba4aa6a09cdb094d595d60e0f916b3f527
Unapplied parent: 8d81586cd53adf4d680f2f69cb817ec08fbefa01

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

ubuntu/xenial-devel 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-unapplied version 4.0.6-1ubuntu0.6 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2019-03-11 16:50:36 UTC

Import patches-unapplied version 4.0.6-1ubuntu0.6 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: acece0f9dd47a93bdbd3e87d1604d399655daaf6

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

ubuntu/cosmic-updates 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-unapplied version 4.0.9-6ubuntu0.2 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2019-03-11 15:10:30 UTC

Import patches-unapplied version 4.0.9-6ubuntu0.2 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 682f516d5bead73df9f8df2c7cc52f0b95071944

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

applied/ubuntu/cosmic-updates 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-applied version 4.0.9-6ubuntu0.2 to applied/ubuntu/cosmic-secu...

Author: Marc Deslauriers
Author Date: 2019-03-11 15:10:30 UTC

Import patches-applied version 4.0.9-6ubuntu0.2 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 74d9abba4aa6a09cdb094d595d60e0f916b3f527
Unapplied parent: 8d81586cd53adf4d680f2f69cb817ec08fbefa01

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

applied/ubuntu/trusty-devel 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-applied version 4.0.3-7ubuntu0.11 to applied/ubuntu/trusty-sec...

Author: Marc Deslauriers
Author Date: 2019-03-11 16:51:58 UTC

Import patches-applied version 4.0.3-7ubuntu0.11 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: b740291c2b7093e6ba7dbe3834c51ea0b7841cdb
Unapplied parent: 595c71f08f3f039603034e125deaafdd8692bb68

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

ubuntu/bionic-devel 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-unapplied version 4.0.9-5ubuntu0.2 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2019-03-11 15:59:03 UTC

Import patches-unapplied version 4.0.9-5ubuntu0.2 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: a8515c659ed7f314cdff0789436ee6c14503eca9

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

ubuntu/bionic-updates 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-unapplied version 4.0.9-5ubuntu0.2 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2019-03-11 15:59:03 UTC

Import patches-unapplied version 4.0.9-5ubuntu0.2 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: a8515c659ed7f314cdff0789436ee6c14503eca9

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

ubuntu/bionic-security 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-unapplied version 4.0.9-5ubuntu0.2 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2019-03-11 15:59:03 UTC

Import patches-unapplied version 4.0.9-5ubuntu0.2 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: a8515c659ed7f314cdff0789436ee6c14503eca9

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

applied/ubuntu/trusty-updates 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-applied version 4.0.3-7ubuntu0.11 to applied/ubuntu/trusty-sec...

Author: Marc Deslauriers
Author Date: 2019-03-11 16:51:58 UTC

Import patches-applied version 4.0.3-7ubuntu0.11 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: b740291c2b7093e6ba7dbe3834c51ea0b7841cdb
Unapplied parent: 595c71f08f3f039603034e125deaafdd8692bb68

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

ubuntu/cosmic-security 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-unapplied version 4.0.9-6ubuntu0.2 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2019-03-11 15:10:30 UTC

Import patches-unapplied version 4.0.9-6ubuntu0.2 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 682f516d5bead73df9f8df2c7cc52f0b95071944

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

ubuntu/trusty-updates 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-unapplied version 4.0.3-7ubuntu0.11 to ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2019-03-11 16:51:58 UTC

Import patches-unapplied version 4.0.3-7ubuntu0.11 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: f819a812aa1a9839ede6ac1a2e3f3a8b27b4216f

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

applied/ubuntu/bionic-security 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-applied version 4.0.9-5ubuntu0.2 to applied/ubuntu/bionic-secu...

Author: Marc Deslauriers
Author Date: 2019-03-11 15:59:03 UTC

Import patches-applied version 4.0.9-5ubuntu0.2 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: c3de5b1852a7008b5888386ec0875a92869fc697
Unapplied parent: 105389509b6cc6f10a0b98aaa2ebb437f5c3b4cf

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

ubuntu/trusty-security 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-unapplied version 4.0.3-7ubuntu0.11 to ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2019-03-11 16:51:58 UTC

Import patches-unapplied version 4.0.3-7ubuntu0.11 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: f819a812aa1a9839ede6ac1a2e3f3a8b27b4216f

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

applied/ubuntu/bionic-updates 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-applied version 4.0.9-5ubuntu0.2 to applied/ubuntu/bionic-secu...

Author: Marc Deslauriers
Author Date: 2019-03-11 15:59:03 UTC

Import patches-applied version 4.0.9-5ubuntu0.2 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: c3de5b1852a7008b5888386ec0875a92869fc697
Unapplied parent: 105389509b6cc6f10a0b98aaa2ebb437f5c3b4cf

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

applied/ubuntu/trusty-security 2019-03-12 12:53:14 UTC 2019-03-12
Import patches-applied version 4.0.3-7ubuntu0.11 to applied/ubuntu/trusty-sec...

Author: Marc Deslauriers
Author Date: 2019-03-11 16:51:58 UTC

Import patches-applied version 4.0.3-7ubuntu0.11 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: b740291c2b7093e6ba7dbe3834c51ea0b7841cdb
Unapplied parent: 595c71f08f3f039603034e125deaafdd8692bb68

New changelog entries:
  * SECURITY UPDATE: heap over-read in TIFFWriteScanline
    - debian/patches/CVE-2018-10779.patch: fix overflow in
      libtiff/tif_write.c.
    - CVE-2018-10779
  * SECURITY UPDATE: heap over-read in cpSeparateBufToContigBuf
    - debian/patches/CVE-2018-12900-1.patch: check for overflow in
      tools/tiffcp.c.
    - debian/patches/CVE-2018-12900-2.patch: use INT_MAX in tools/tiffcp.c.
    - CVE-2018-12900
    - CVE-2019-7663
  * SECURITY UPDATE: NULL pointer dereference in _TIFFmemcmp
    - debian/patches/CVE-2018-17000.patch: add NULL check in
      libtiff/tif_dirwrite.c.
    - CVE-2018-17000
  * SECURITY UPDATE: NULL pointer dereference in TIFFWriteDirectorySec
    - debian/patches/CVE-2018-19210-1.patch: unset transferfunction field
      if necessary in libtiff/tif_dir.c.
    - debian/patches/CVE-2018-19210-2.patch: fix warning in
      libtiff/tif_dir.c.
    - CVE-2018-19210
  * SECURITY UPDATE: memory leak in TIFFFdOpen
    - debian/patches/CVE-2019-6128.patch: properly handle errors in
      tools/pal2rgb.c.
    - CVE-2019-6128

applied/debian/stretch 2019-02-16 17:21:26 UTC 2019-02-16
Import patches-applied version 4.0.8-2+deb9u4 to applied/debian/stretch

Author: Moritz Mühlenhoff
Author Date: 2018-11-29 19:45:11 UTC

Import patches-applied version 4.0.8-2+deb9u4 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: 83ff22c4cb2d87d2757bfc0b494a6e27a527189f
Unapplied parent: d99956bb46d46395029642e36a6cb71f7777ef2b

New changelog entries:
  * CVE-2018-5784 (Closes: #890441)
  * CVE-2018-7456 (Closes: #891288)
  * CVE-2018-8905 (Closes: #893806)
  * CVE-2018-10963 (Closes: #898348)
  * CVE-2018-17101 (Closes: #909037)
  * CVE-2018-18557 (Closes: #911635)
  * CVE-2017-11613 (Closes: #869823)
  * CVE-2017-17095 (Closes: #883320)
    (deb9u3 is unreleased, broken interim)

debian/stretch 2019-02-16 17:21:26 UTC 2019-02-16
Import patches-unapplied version 4.0.8-2+deb9u4 to debian/stretch

Author: Moritz Mühlenhoff
Author Date: 2018-11-29 19:45:11 UTC

Import patches-unapplied version 4.0.8-2+deb9u4 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: 537a236a1c9b9ef8f835d27909047051038d893c

New changelog entries:
  * CVE-2018-5784 (Closes: #890441)
  * CVE-2018-7456 (Closes: #891288)
  * CVE-2018-8905 (Closes: #893806)
  * CVE-2018-10963 (Closes: #898348)
  * CVE-2018-17101 (Closes: #909037)
  * CVE-2018-18557 (Closes: #911635)
  * CVE-2017-11613 (Closes: #869823)
  * CVE-2017-17095 (Closes: #883320)
    (deb9u3 is unreleased, broken interim)

ubuntu/disco-devel 2019-02-03 04:41:50 UTC 2019-02-03
Import patches-unapplied version 4.0.10-4 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-02-02 18:34:29 UTC

Import patches-unapplied version 4.0.10-4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: f1eefb8cded01b7bd72ccf5aa25af427bcf4fe35

New changelog entries:
  * Backport security fixes:
    - CVE-2018-12900: heap-based buffer overflow in
      cpSeparateBufToContigBuf() cause remote DoS (closes: #902718),
    - CVE-2018-17000: NULL pointer dereference in _TIFFmemcmp() cause DoS
      (closes: #908778),
    - CVE-2018-19210: NULL pointer dereference in TIFFWriteDirectorySec()
      cause DoS (closes: #913675),
    - CVE-2019-6128: TIFFFdOpen() memory leak (closes: #921157).
  * Update watch file.
  * Update Standards-Version to 4.3.0 .

ubuntu/disco-proposed 2019-02-03 04:41:50 UTC 2019-02-03
Import patches-unapplied version 4.0.10-4 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-02-02 18:34:29 UTC

Import patches-unapplied version 4.0.10-4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: f1eefb8cded01b7bd72ccf5aa25af427bcf4fe35

New changelog entries:
  * Backport security fixes:
    - CVE-2018-12900: heap-based buffer overflow in
      cpSeparateBufToContigBuf() cause remote DoS (closes: #902718),
    - CVE-2018-17000: NULL pointer dereference in _TIFFmemcmp() cause DoS
      (closes: #908778),
    - CVE-2018-19210: NULL pointer dereference in TIFFWriteDirectorySec()
      cause DoS (closes: #913675),
    - CVE-2019-6128: TIFFFdOpen() memory leak (closes: #921157).
  * Update watch file.
  * Update Standards-Version to 4.3.0 .

ubuntu/disco 2019-02-03 04:41:50 UTC 2019-02-03
Import patches-unapplied version 4.0.10-4 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-02-02 18:34:29 UTC

Import patches-unapplied version 4.0.10-4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: f1eefb8cded01b7bd72ccf5aa25af427bcf4fe35

New changelog entries:
  * Backport security fixes:
    - CVE-2018-12900: heap-based buffer overflow in
      cpSeparateBufToContigBuf() cause remote DoS (closes: #902718),
    - CVE-2018-17000: NULL pointer dereference in _TIFFmemcmp() cause DoS
      (closes: #908778),
    - CVE-2018-19210: NULL pointer dereference in TIFFWriteDirectorySec()
      cause DoS (closes: #913675),
    - CVE-2019-6128: TIFFFdOpen() memory leak (closes: #921157).
  * Update watch file.
  * Update Standards-Version to 4.3.0 .

debian/buster 2019-02-03 04:41:50 UTC 2019-02-03
Import patches-unapplied version 4.0.10-4 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-02-02 18:34:29 UTC

Import patches-unapplied version 4.0.10-4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: f1eefb8cded01b7bd72ccf5aa25af427bcf4fe35

New changelog entries:
  * Backport security fixes:
    - CVE-2018-12900: heap-based buffer overflow in
      cpSeparateBufToContigBuf() cause remote DoS (closes: #902718),
    - CVE-2018-17000: NULL pointer dereference in _TIFFmemcmp() cause DoS
      (closes: #908778),
    - CVE-2018-19210: NULL pointer dereference in TIFFWriteDirectorySec()
      cause DoS (closes: #913675),
    - CVE-2019-6128: TIFFFdOpen() memory leak (closes: #921157).
  * Update watch file.
  * Update Standards-Version to 4.3.0 .

applied/ubuntu/disco-proposed 2019-02-03 04:41:50 UTC 2019-02-03
Import patches-applied version 4.0.10-4 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-02-02 18:34:29 UTC

Import patches-applied version 4.0.10-4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 039dfb9a77bda430759d58f6371331590fa97f42
Unapplied parent: b25aadcc65a96d45087ab9bd3b6b1b68ef31e14d

New changelog entries:
  * Backport security fixes:
    - CVE-2018-12900: heap-based buffer overflow in
      cpSeparateBufToContigBuf() cause remote DoS (closes: #902718),
    - CVE-2018-17000: NULL pointer dereference in _TIFFmemcmp() cause DoS
      (closes: #908778),
    - CVE-2018-19210: NULL pointer dereference in TIFFWriteDirectorySec()
      cause DoS (closes: #913675),
    - CVE-2019-6128: TIFFFdOpen() memory leak (closes: #921157).
  * Update watch file.
  * Update Standards-Version to 4.3.0 .

applied/ubuntu/disco-devel 2019-02-03 04:41:50 UTC 2019-02-03
Import patches-applied version 4.0.10-4 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-02-02 18:34:29 UTC

Import patches-applied version 4.0.10-4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 039dfb9a77bda430759d58f6371331590fa97f42
Unapplied parent: b25aadcc65a96d45087ab9bd3b6b1b68ef31e14d

New changelog entries:
  * Backport security fixes:
    - CVE-2018-12900: heap-based buffer overflow in
      cpSeparateBufToContigBuf() cause remote DoS (closes: #902718),
    - CVE-2018-17000: NULL pointer dereference in _TIFFmemcmp() cause DoS
      (closes: #908778),
    - CVE-2018-19210: NULL pointer dereference in TIFFWriteDirectorySec()
      cause DoS (closes: #913675),
    - CVE-2019-6128: TIFFFdOpen() memory leak (closes: #921157).
  * Update watch file.
  * Update Standards-Version to 4.3.0 .

applied/debian/buster 2019-02-03 04:41:50 UTC 2019-02-03
Import patches-applied version 4.0.10-4 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-02-02 18:34:29 UTC

Import patches-applied version 4.0.10-4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 039dfb9a77bda430759d58f6371331590fa97f42
Unapplied parent: b25aadcc65a96d45087ab9bd3b6b1b68ef31e14d

New changelog entries:
  * Backport security fixes:
    - CVE-2018-12900: heap-based buffer overflow in
      cpSeparateBufToContigBuf() cause remote DoS (closes: #902718),
    - CVE-2018-17000: NULL pointer dereference in _TIFFmemcmp() cause DoS
      (closes: #908778),
    - CVE-2018-19210: NULL pointer dereference in TIFFWriteDirectorySec()
      cause DoS (closes: #913675),
    - CVE-2019-6128: TIFFFdOpen() memory leak (closes: #921157).
  * Update watch file.
  * Update Standards-Version to 4.3.0 .

applied/ubuntu/disco 2019-02-03 04:41:50 UTC 2019-02-03
Import patches-applied version 4.0.10-4 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2019-02-02 18:34:29 UTC

Import patches-applied version 4.0.10-4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 039dfb9a77bda430759d58f6371331590fa97f42
Unapplied parent: b25aadcc65a96d45087ab9bd3b6b1b68ef31e14d

New changelog entries:
  * Backport security fixes:
    - CVE-2018-12900: heap-based buffer overflow in
      cpSeparateBufToContigBuf() cause remote DoS (closes: #902718),
    - CVE-2018-17000: NULL pointer dereference in _TIFFmemcmp() cause DoS
      (closes: #908778),
    - CVE-2018-19210: NULL pointer dereference in TIFFWriteDirectorySec()
      cause DoS (closes: #913675),
    - CVE-2019-6128: TIFFFdOpen() memory leak (closes: #921157).
  * Update watch file.
  * Update Standards-Version to 4.3.0 .

ubuntu/cosmic-proposed 2018-07-02 04:40:26 UTC 2018-07-02
Import patches-unapplied version 4.0.9-6 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2018-07-01 19:46:23 UTC

Import patches-unapplied version 4.0.9-6 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 6d0e38d2068e03f0bd92feceea01ba57ff42accc

New changelog entries:
  * Fix CVE-2018-8905: eap-based buffer overflow in LZWDecodeCompat()
    (closes: #893806).
  * Fix CVE-2018-10963: remote denial of service (closes: #898348).

applied/ubuntu/cosmic-proposed 2018-07-02 04:40:26 UTC 2018-07-02
Import patches-applied version 4.0.9-6 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2018-07-01 19:46:23 UTC

Import patches-applied version 4.0.9-6 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 97593502615f146e02593a14995240beac5af5d6
Unapplied parent: c0449d8da7a2693801b9bb4940c75afd9c73606a

New changelog entries:
  * Fix CVE-2018-8905: eap-based buffer overflow in LZWDecodeCompat()
    (closes: #893806).
  * Fix CVE-2018-10963: remote denial of service (closes: #898348).

ubuntu/cosmic 2018-07-02 04:40:26 UTC 2018-07-02
Import patches-unapplied version 4.0.9-6 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2018-07-01 19:46:23 UTC

Import patches-unapplied version 4.0.9-6 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 6d0e38d2068e03f0bd92feceea01ba57ff42accc

New changelog entries:
  * Fix CVE-2018-8905: eap-based buffer overflow in LZWDecodeCompat()
    (closes: #893806).
  * Fix CVE-2018-10963: remote denial of service (closes: #898348).

applied/ubuntu/cosmic 2018-07-02 04:40:26 UTC 2018-07-02
Import patches-applied version 4.0.9-6 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2018-07-01 19:46:23 UTC

Import patches-applied version 4.0.9-6 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 97593502615f146e02593a14995240beac5af5d6
Unapplied parent: c0449d8da7a2693801b9bb4940c75afd9c73606a

New changelog entries:
  * Fix CVE-2018-8905: eap-based buffer overflow in LZWDecodeCompat()
    (closes: #893806).
  * Fix CVE-2018-10963: remote denial of service (closes: #898348).

debian/jessie 2018-06-23 17:30:53 UTC 2018-06-23
Import patches-unapplied version 4.0.3-12.3+deb8u5 to debian/jessie

Author: Moritz Muehlenhoff
Author Date: 2018-01-26 20:53:45 UTC

Import patches-unapplied version 4.0.3-12.3+deb8u5 to debian/jessie

Imported using git-ubuntu import.

Changelog parent: 8477fdf1f3a3c8f5bbfcbb8f070fe76b8f608839

New changelog entries:
  [ Laszlo Boszormenyi (GCS) ]
  * Fix CVE-2017-11335: heap based buffer write overflow in tiff2pdf
    (closes: #868513).
  * Fix CVE-2017-12944: OOM prevention in TIFFReadDirEntryArray()
    (closes: #872607).
  * Fix CVE-2017-13726: reachable assertion abort in TIFFWriteDirectorySec()
    (closes: #873880).
  * Fix CVE-2017-13727: reachable assertion abort in
    TIFFWriteDirectoryTagSubifd() (closes: #873879).
  * Fix CVE-2017-18013: NULL pointer dereference in TIFFPrintDirectory()
    (closes: #885985).
  * Fix CVE-2017-9935: heap-based buffer overflow in the t2p_write_pdf()
    function (closes: #866109).

  [ Moritz Muehlenhoff ]
  * CVE-2016-10371

applied/debian/jessie 2018-06-23 17:30:53 UTC 2018-06-23
Import patches-applied version 4.0.3-12.3+deb8u5 to applied/debian/jessie

Author: Moritz Muehlenhoff
Author Date: 2018-01-26 20:53:45 UTC

Import patches-applied version 4.0.3-12.3+deb8u5 to applied/debian/jessie

Imported using git-ubuntu import.

Changelog parent: 1e295a901be0a063ff9527db7aa3ca72a3758900
Unapplied parent: fc72844bb0d2057594bab2ede25636ba4d4eb5a2

New changelog entries:
  [ Laszlo Boszormenyi (GCS) ]
  * Fix CVE-2017-11335: heap based buffer write overflow in tiff2pdf
    (closes: #868513).
  * Fix CVE-2017-12944: OOM prevention in TIFFReadDirEntryArray()
    (closes: #872607).
  * Fix CVE-2017-13726: reachable assertion abort in TIFFWriteDirectorySec()
    (closes: #873880).
  * Fix CVE-2017-13727: reachable assertion abort in
    TIFFWriteDirectoryTagSubifd() (closes: #873879).
  * Fix CVE-2017-18013: NULL pointer dereference in TIFFPrintDirectory()
    (closes: #885985).
  * Fix CVE-2017-9935: heap-based buffer overflow in the t2p_write_pdf()
    function (closes: #866109).

  [ Moritz Muehlenhoff ]
  * CVE-2016-10371

applied/ubuntu/bionic 2018-04-15 22:41:39 UTC 2018-04-15
Import patches-applied version 4.0.9-5 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2018-04-15 18:13:42 UTC

Import patches-applied version 4.0.9-5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 41edf538ccba253a57953d3a814827657ed81c58
Unapplied parent: 1b7adbad96b44e9d2d100838fba67c0812fe7397

New changelog entries:
  * Fix CVE-2017-11613: avoid memory exhaustion in
    ChopUpSingleUncompressedStrip() (closes: #869823).
  * Fix CVE-2018-7456: NULL pointer dereference in TIFFPrintDirectory()
    (closes: #891288).
  * Fix CVE-2017-17095: heap-based buffer overflow in pal2rgb tool
    (closes: #883320).
  * Don't specify parallel to debhelper.
  * Update Standards-Version to 4.1.4 .

ubuntu/bionic 2018-04-15 22:41:39 UTC 2018-04-15
Import patches-unapplied version 4.0.9-5 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2018-04-15 18:13:42 UTC

Import patches-unapplied version 4.0.9-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: cb48b80f433708823e6f833c490b7c2ef7786408

New changelog entries:
  * Fix CVE-2017-11613: avoid memory exhaustion in
    ChopUpSingleUncompressedStrip() (closes: #869823).
  * Fix CVE-2018-7456: NULL pointer dereference in TIFFPrintDirectory()
    (closes: #891288).
  * Fix CVE-2017-17095: heap-based buffer overflow in pal2rgb tool
    (closes: #883320).
  * Don't specify parallel to debhelper.
  * Update Standards-Version to 4.1.4 .

ubuntu/bionic-proposed 2018-04-15 22:41:39 UTC 2018-04-15
Import patches-unapplied version 4.0.9-5 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2018-04-15 18:13:42 UTC

Import patches-unapplied version 4.0.9-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: cb48b80f433708823e6f833c490b7c2ef7786408

New changelog entries:
  * Fix CVE-2017-11613: avoid memory exhaustion in
    ChopUpSingleUncompressedStrip() (closes: #869823).
  * Fix CVE-2018-7456: NULL pointer dereference in TIFFPrintDirectory()
    (closes: #891288).
  * Fix CVE-2017-17095: heap-based buffer overflow in pal2rgb tool
    (closes: #883320).
  * Don't specify parallel to debhelper.
  * Update Standards-Version to 4.1.4 .

applied/ubuntu/bionic-proposed 2018-04-15 22:41:39 UTC 2018-04-15
Import patches-applied version 4.0.9-5 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2018-04-15 18:13:42 UTC

Import patches-applied version 4.0.9-5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 41edf538ccba253a57953d3a814827657ed81c58
Unapplied parent: 1b7adbad96b44e9d2d100838fba67c0812fe7397

New changelog entries:
  * Fix CVE-2017-11613: avoid memory exhaustion in
    ChopUpSingleUncompressedStrip() (closes: #869823).
  * Fix CVE-2018-7456: NULL pointer dereference in TIFFPrintDirectory()
    (closes: #891288).
  * Fix CVE-2017-17095: heap-based buffer overflow in pal2rgb tool
    (closes: #883320).
  * Don't specify parallel to debhelper.
  * Update Standards-Version to 4.1.4 .

importer/ubuntu/pristine-tar 2018-04-03 09:29:19 UTC 2018-04-03
pristine-tar data for tiff_4.0.9.orig.tar.gz

Author: Ubuntu Git Importer
Author Date: 2018-04-03 09:29:19 UTC

pristine-tar data for tiff_4.0.9.orig.tar.gz

importer/debian/pristine-tar 2018-04-03 08:42:14 UTC 2018-04-03
pristine-tar data for tiff_4.0.9.orig.tar.gz

Author: Ubuntu Git Importer
Author Date: 2018-04-03 08:42:14 UTC

pristine-tar data for tiff_4.0.9.orig.tar.gz

applied/ubuntu/artful-updates 2018-03-26 11:53:23 UTC 2018-03-26
Import patches-applied version 4.0.8-5ubuntu0.1 to applied/ubuntu/artful-secu...

Author: Marc Deslauriers
Author Date: 2018-03-22 13:52:02 UTC

Import patches-applied version 4.0.8-5ubuntu0.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 6176f3cde1910c37bd85b6baa6a80fa25fe18387
Unapplied parent: b6a381f3eef19e8be7f476b6db621a198755f81a

New changelog entries:
  * SECURITY UPDATE: heap-based buffer overflow in t2p_write_pdf
    - debian/patches/CVE-2017-9935-1.patch: fix transfer function handling
      in libtiff/tif_dir.c, tools/tiff2pdf.c.
    - debian/patches/CVE-2017-9935-2.patch: fix incorrect type for transfer
      table in tools/tiff2pdf.c.
    - CVE-2017-9935
  * SECURITY UPDATE: DoS in TIFFOpen
    - debian/patches/CVE-2017-11613-1.patch: avoid memory exhaustion in
      libtiff/tif_dirread.c.
    - debian/patches/CVE-2017-11613-2.patch: rework fix in
      libtiff/tif_dirread.c.
    - CVE-2017-11613
  * SECURITY UPDATE: DoS in TIFFReadDirEntryArray
    - debian/patches/CVE-2017-12944.patch: add protection against excessive
      memory allocation attempts in libtiff/tif_dirread.c.
    - CVE-2017-12944
  * SECURITY UPDATE: TIFFSetupStrips heap overflow in pal2rgb
    - debian/patches/CVE-2017-17095.patch: add workaround to
      tools/pal2rgb.c.
    - CVE-2017-17095
  * SECURITY UPDATE: null pointer dereference
    - debian/patches/CVE-2017-18013.patch: fix null pointer dereference in
      libtiff/tif_print.c.
    - CVE-2017-18013
  * SECURITY UPDATE: DoS via resource consumption
    - debian/patches/CVE-2018-5784.patch: fix infinite loop in
      contrib/addtiffo/tif_overview.c, tools/tiff2pdf.c, tools/tiffcrop.c.
    - CVE-2018-5784

applied/ubuntu/artful-security 2018-03-26 11:53:23 UTC 2018-03-26
Import patches-applied version 4.0.8-5ubuntu0.1 to applied/ubuntu/artful-secu...

Author: Marc Deslauriers
Author Date: 2018-03-22 13:52:02 UTC

Import patches-applied version 4.0.8-5ubuntu0.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 6176f3cde1910c37bd85b6baa6a80fa25fe18387
Unapplied parent: b6a381f3eef19e8be7f476b6db621a198755f81a

New changelog entries:
  * SECURITY UPDATE: heap-based buffer overflow in t2p_write_pdf
    - debian/patches/CVE-2017-9935-1.patch: fix transfer function handling
      in libtiff/tif_dir.c, tools/tiff2pdf.c.
    - debian/patches/CVE-2017-9935-2.patch: fix incorrect type for transfer
      table in tools/tiff2pdf.c.
    - CVE-2017-9935
  * SECURITY UPDATE: DoS in TIFFOpen
    - debian/patches/CVE-2017-11613-1.patch: avoid memory exhaustion in
      libtiff/tif_dirread.c.
    - debian/patches/CVE-2017-11613-2.patch: rework fix in
      libtiff/tif_dirread.c.
    - CVE-2017-11613
  * SECURITY UPDATE: DoS in TIFFReadDirEntryArray
    - debian/patches/CVE-2017-12944.patch: add protection against excessive
      memory allocation attempts in libtiff/tif_dirread.c.
    - CVE-2017-12944
  * SECURITY UPDATE: TIFFSetupStrips heap overflow in pal2rgb
    - debian/patches/CVE-2017-17095.patch: add workaround to
      tools/pal2rgb.c.
    - CVE-2017-17095
  * SECURITY UPDATE: null pointer dereference
    - debian/patches/CVE-2017-18013.patch: fix null pointer dereference in
      libtiff/tif_print.c.
    - CVE-2017-18013
  * SECURITY UPDATE: DoS via resource consumption
    - debian/patches/CVE-2018-5784.patch: fix infinite loop in
      contrib/addtiffo/tif_overview.c, tools/tiff2pdf.c, tools/tiffcrop.c.
    - CVE-2018-5784

applied/ubuntu/artful-devel 2018-03-26 11:53:23 UTC 2018-03-26
Import patches-applied version 4.0.8-5ubuntu0.1 to applied/ubuntu/artful-secu...

Author: Marc Deslauriers
Author Date: 2018-03-22 13:52:02 UTC

Import patches-applied version 4.0.8-5ubuntu0.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 6176f3cde1910c37bd85b6baa6a80fa25fe18387
Unapplied parent: b6a381f3eef19e8be7f476b6db621a198755f81a

New changelog entries:
  * SECURITY UPDATE: heap-based buffer overflow in t2p_write_pdf
    - debian/patches/CVE-2017-9935-1.patch: fix transfer function handling
      in libtiff/tif_dir.c, tools/tiff2pdf.c.
    - debian/patches/CVE-2017-9935-2.patch: fix incorrect type for transfer
      table in tools/tiff2pdf.c.
    - CVE-2017-9935
  * SECURITY UPDATE: DoS in TIFFOpen
    - debian/patches/CVE-2017-11613-1.patch: avoid memory exhaustion in
      libtiff/tif_dirread.c.
    - debian/patches/CVE-2017-11613-2.patch: rework fix in
      libtiff/tif_dirread.c.
    - CVE-2017-11613
  * SECURITY UPDATE: DoS in TIFFReadDirEntryArray
    - debian/patches/CVE-2017-12944.patch: add protection against excessive
      memory allocation attempts in libtiff/tif_dirread.c.
    - CVE-2017-12944
  * SECURITY UPDATE: TIFFSetupStrips heap overflow in pal2rgb
    - debian/patches/CVE-2017-17095.patch: add workaround to
      tools/pal2rgb.c.
    - CVE-2017-17095
  * SECURITY UPDATE: null pointer dereference
    - debian/patches/CVE-2017-18013.patch: fix null pointer dereference in
      libtiff/tif_print.c.
    - CVE-2017-18013
  * SECURITY UPDATE: DoS via resource consumption
    - debian/patches/CVE-2018-5784.patch: fix infinite loop in
      contrib/addtiffo/tif_overview.c, tools/tiff2pdf.c, tools/tiffcrop.c.
    - CVE-2018-5784

ubuntu/artful-devel 2018-03-26 11:53:23 UTC 2018-03-26
Import patches-unapplied version 4.0.8-5ubuntu0.1 to ubuntu/artful-security

Author: Marc Deslauriers
Author Date: 2018-03-22 13:52:02 UTC

Import patches-unapplied version 4.0.8-5ubuntu0.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 310000edfd7964bf3e064586a2ba2de6eac2ae3b

New changelog entries:
  * SECURITY UPDATE: heap-based buffer overflow in t2p_write_pdf
    - debian/patches/CVE-2017-9935-1.patch: fix transfer function handling
      in libtiff/tif_dir.c, tools/tiff2pdf.c.
    - debian/patches/CVE-2017-9935-2.patch: fix incorrect type for transfer
      table in tools/tiff2pdf.c.
    - CVE-2017-9935
  * SECURITY UPDATE: DoS in TIFFOpen
    - debian/patches/CVE-2017-11613-1.patch: avoid memory exhaustion in
      libtiff/tif_dirread.c.
    - debian/patches/CVE-2017-11613-2.patch: rework fix in
      libtiff/tif_dirread.c.
    - CVE-2017-11613
  * SECURITY UPDATE: DoS in TIFFReadDirEntryArray
    - debian/patches/CVE-2017-12944.patch: add protection against excessive
      memory allocation attempts in libtiff/tif_dirread.c.
    - CVE-2017-12944
  * SECURITY UPDATE: TIFFSetupStrips heap overflow in pal2rgb
    - debian/patches/CVE-2017-17095.patch: add workaround to
      tools/pal2rgb.c.
    - CVE-2017-17095
  * SECURITY UPDATE: null pointer dereference
    - debian/patches/CVE-2017-18013.patch: fix null pointer dereference in
      libtiff/tif_print.c.
    - CVE-2017-18013
  * SECURITY UPDATE: DoS via resource consumption
    - debian/patches/CVE-2018-5784.patch: fix infinite loop in
      contrib/addtiffo/tif_overview.c, tools/tiff2pdf.c, tools/tiffcrop.c.
    - CVE-2018-5784

ubuntu/artful-security 2018-03-26 11:53:23 UTC 2018-03-26
Import patches-unapplied version 4.0.8-5ubuntu0.1 to ubuntu/artful-security

Author: Marc Deslauriers
Author Date: 2018-03-22 13:52:02 UTC

Import patches-unapplied version 4.0.8-5ubuntu0.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 310000edfd7964bf3e064586a2ba2de6eac2ae3b

New changelog entries:
  * SECURITY UPDATE: heap-based buffer overflow in t2p_write_pdf
    - debian/patches/CVE-2017-9935-1.patch: fix transfer function handling
      in libtiff/tif_dir.c, tools/tiff2pdf.c.
    - debian/patches/CVE-2017-9935-2.patch: fix incorrect type for transfer
      table in tools/tiff2pdf.c.
    - CVE-2017-9935
  * SECURITY UPDATE: DoS in TIFFOpen
    - debian/patches/CVE-2017-11613-1.patch: avoid memory exhaustion in
      libtiff/tif_dirread.c.
    - debian/patches/CVE-2017-11613-2.patch: rework fix in
      libtiff/tif_dirread.c.
    - CVE-2017-11613
  * SECURITY UPDATE: DoS in TIFFReadDirEntryArray
    - debian/patches/CVE-2017-12944.patch: add protection against excessive
      memory allocation attempts in libtiff/tif_dirread.c.
    - CVE-2017-12944
  * SECURITY UPDATE: TIFFSetupStrips heap overflow in pal2rgb
    - debian/patches/CVE-2017-17095.patch: add workaround to
      tools/pal2rgb.c.
    - CVE-2017-17095
  * SECURITY UPDATE: null pointer dereference
    - debian/patches/CVE-2017-18013.patch: fix null pointer dereference in
      libtiff/tif_print.c.
    - CVE-2017-18013
  * SECURITY UPDATE: DoS via resource consumption
    - debian/patches/CVE-2018-5784.patch: fix infinite loop in
      contrib/addtiffo/tif_overview.c, tools/tiff2pdf.c, tools/tiffcrop.c.
    - CVE-2018-5784

ubuntu/artful-updates 2018-03-26 11:53:23 UTC 2018-03-26
Import patches-unapplied version 4.0.8-5ubuntu0.1 to ubuntu/artful-security

Author: Marc Deslauriers
Author Date: 2018-03-22 13:52:02 UTC

Import patches-unapplied version 4.0.8-5ubuntu0.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 310000edfd7964bf3e064586a2ba2de6eac2ae3b

New changelog entries:
  * SECURITY UPDATE: heap-based buffer overflow in t2p_write_pdf
    - debian/patches/CVE-2017-9935-1.patch: fix transfer function handling
      in libtiff/tif_dir.c, tools/tiff2pdf.c.
    - debian/patches/CVE-2017-9935-2.patch: fix incorrect type for transfer
      table in tools/tiff2pdf.c.
    - CVE-2017-9935
  * SECURITY UPDATE: DoS in TIFFOpen
    - debian/patches/CVE-2017-11613-1.patch: avoid memory exhaustion in
      libtiff/tif_dirread.c.
    - debian/patches/CVE-2017-11613-2.patch: rework fix in
      libtiff/tif_dirread.c.
    - CVE-2017-11613
  * SECURITY UPDATE: DoS in TIFFReadDirEntryArray
    - debian/patches/CVE-2017-12944.patch: add protection against excessive
      memory allocation attempts in libtiff/tif_dirread.c.
    - CVE-2017-12944
  * SECURITY UPDATE: TIFFSetupStrips heap overflow in pal2rgb
    - debian/patches/CVE-2017-17095.patch: add workaround to
      tools/pal2rgb.c.
    - CVE-2017-17095
  * SECURITY UPDATE: null pointer dereference
    - debian/patches/CVE-2017-18013.patch: fix null pointer dereference in
      libtiff/tif_print.c.
    - CVE-2017-18013
  * SECURITY UPDATE: DoS via resource consumption
    - debian/patches/CVE-2018-5784.patch: fix infinite loop in
      contrib/addtiffo/tif_overview.c, tools/tiff2pdf.c, tools/tiffcrop.c.
    - CVE-2018-5784

applied/ubuntu/artful-proposed 2017-09-01 04:38:04 UTC 2017-09-01
Import patches-applied version 4.0.8-5 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2017-08-31 21:09:59 UTC

Import patches-applied version 4.0.8-5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 89f7ca4489e95a4c9bfa369d9814e4e186375586
Unapplied parent: 92916cc09fc0a3d68815ead4ea38788085209b17

New changelog entries:
  * Backport security fixes:
    - CVE-2017-13726, reachable assertion abort in TIFFWriteDirectorySec()
      (closes: #873880),
    - CVE-2017-13727, reachable assertion abort in
      TIFFWriteDirectoryTagSubifd() (closes: #873879).

ubuntu/artful 2017-09-01 04:38:04 UTC 2017-09-01
Import patches-unapplied version 4.0.8-5 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2017-08-31 21:09:59 UTC

Import patches-unapplied version 4.0.8-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: ae1618e06a2260315276826a1808540fdcacdd7c

New changelog entries:
  * Backport security fixes:
    - CVE-2017-13726, reachable assertion abort in TIFFWriteDirectorySec()
      (closes: #873880),
    - CVE-2017-13727, reachable assertion abort in
      TIFFWriteDirectoryTagSubifd() (closes: #873879).

applied/ubuntu/artful 2017-09-01 04:38:04 UTC 2017-09-01
Import patches-applied version 4.0.8-5 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2017-08-31 21:09:59 UTC

Import patches-applied version 4.0.8-5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 89f7ca4489e95a4c9bfa369d9814e4e186375586
Unapplied parent: 92916cc09fc0a3d68815ead4ea38788085209b17

New changelog entries:
  * Backport security fixes:
    - CVE-2017-13726, reachable assertion abort in TIFFWriteDirectorySec()
      (closes: #873880),
    - CVE-2017-13727, reachable assertion abort in
      TIFFWriteDirectoryTagSubifd() (closes: #873879).

ubuntu/artful-proposed 2017-09-01 04:38:04 UTC 2017-09-01
Import patches-unapplied version 4.0.8-5 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2017-08-31 21:09:59 UTC

Import patches-unapplied version 4.0.8-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: ae1618e06a2260315276826a1808540fdcacdd7c

New changelog entries:
  * Backport security fixes:
    - CVE-2017-13726, reachable assertion abort in TIFFWriteDirectorySec()
      (closes: #873880),
    - CVE-2017-13727, reachable assertion abort in
      TIFFWriteDirectoryTagSubifd() (closes: #873879).

applied/ubuntu/yakkety-devel 2017-05-30 13:58:24 UTC 2017-05-30
Import patches-applied version 4.0.6-2ubuntu0.2 to applied/ubuntu/yakkety-sec...

Author: Marc Deslauriers
Author Date: 2017-05-29 11:29:06 UTC

Import patches-applied version 4.0.6-2ubuntu0.2 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 42b41a9da414f50d554f52bb002a30516321ac2c
Unapplied parent: e064c9c89fd3232820994ec9b1ea7a14a2168c18

New changelog entries:
  * SECURITY REGRESSION: JPEG tiff read and write issue due to misapplied
    patches (LP: #1670036)
    - debian/patches/CVE-2016-9297_and_CVE-2016-9448_correct.patch: replace
      two previous patches with one that applies fix to correct location.
    - Thanks to John Cupitt and Even Rouault

applied/ubuntu/yakkety-security 2017-05-30 13:58:24 UTC 2017-05-30
Import patches-applied version 4.0.6-2ubuntu0.2 to applied/ubuntu/yakkety-sec...

Author: Marc Deslauriers
Author Date: 2017-05-29 11:29:06 UTC

Import patches-applied version 4.0.6-2ubuntu0.2 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 42b41a9da414f50d554f52bb002a30516321ac2c
Unapplied parent: e064c9c89fd3232820994ec9b1ea7a14a2168c18

New changelog entries:
  * SECURITY REGRESSION: JPEG tiff read and write issue due to misapplied
    patches (LP: #1670036)
    - debian/patches/CVE-2016-9297_and_CVE-2016-9448_correct.patch: replace
      two previous patches with one that applies fix to correct location.
    - Thanks to John Cupitt and Even Rouault

applied/ubuntu/yakkety-updates 2017-05-30 13:58:24 UTC 2017-05-30
Import patches-applied version 4.0.6-2ubuntu0.2 to applied/ubuntu/yakkety-sec...

Author: Marc Deslauriers
Author Date: 2017-05-29 11:29:06 UTC

Import patches-applied version 4.0.6-2ubuntu0.2 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 42b41a9da414f50d554f52bb002a30516321ac2c
Unapplied parent: e064c9c89fd3232820994ec9b1ea7a14a2168c18

New changelog entries:
  * SECURITY REGRESSION: JPEG tiff read and write issue due to misapplied
    patches (LP: #1670036)
    - debian/patches/CVE-2016-9297_and_CVE-2016-9448_correct.patch: replace
      two previous patches with one that applies fix to correct location.
    - Thanks to John Cupitt and Even Rouault

ubuntu/yakkety-updates 2017-05-30 13:58:24 UTC 2017-05-30
Import patches-unapplied version 4.0.6-2ubuntu0.2 to ubuntu/yakkety-security

Author: Marc Deslauriers
Author Date: 2017-05-29 11:29:06 UTC

Import patches-unapplied version 4.0.6-2ubuntu0.2 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 854fb0f3db63b9d82553f6b15d990fee172edc8f

New changelog entries:
  * SECURITY REGRESSION: JPEG tiff read and write issue due to misapplied
    patches (LP: #1670036)
    - debian/patches/CVE-2016-9297_and_CVE-2016-9448_correct.patch: replace
      two previous patches with one that applies fix to correct location.
    - Thanks to John Cupitt and Even Rouault

ubuntu/yakkety-devel 2017-05-30 13:58:24 UTC 2017-05-30
Import patches-unapplied version 4.0.6-2ubuntu0.2 to ubuntu/yakkety-security

Author: Marc Deslauriers
Author Date: 2017-05-29 11:29:06 UTC

Import patches-unapplied version 4.0.6-2ubuntu0.2 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 854fb0f3db63b9d82553f6b15d990fee172edc8f

New changelog entries:
  * SECURITY REGRESSION: JPEG tiff read and write issue due to misapplied
    patches (LP: #1670036)
    - debian/patches/CVE-2016-9297_and_CVE-2016-9448_correct.patch: replace
      two previous patches with one that applies fix to correct location.
    - Thanks to John Cupitt and Even Rouault

ubuntu/yakkety-security 2017-05-30 13:58:24 UTC 2017-05-30
Import patches-unapplied version 4.0.6-2ubuntu0.2 to ubuntu/yakkety-security

Author: Marc Deslauriers
Author Date: 2017-05-29 11:29:06 UTC

Import patches-unapplied version 4.0.6-2ubuntu0.2 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 854fb0f3db63b9d82553f6b15d990fee172edc8f

New changelog entries:
  * SECURITY REGRESSION: JPEG tiff read and write issue due to misapplied
    patches (LP: #1670036)
    - debian/patches/CVE-2016-9297_and_CVE-2016-9448_correct.patch: replace
      two previous patches with one that applies fix to correct location.
    - Thanks to John Cupitt and Even Rouault

ubuntu/zesty 2017-01-15 22:22:48 UTC 2017-01-15
Import patches-unapplied version 4.0.7-5 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2017-01-15 16:49:05 UTC

Import patches-unapplied version 4.0.7-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d116df258b294504bdf2aaccbebd01a40959e6b2

New changelog entries:
  * Fix CVE-2017-5225: heap buffer overflow via a crafted BitsPerSample value
    (closes: #851297).

applied/ubuntu/zesty 2017-01-15 22:22:48 UTC 2017-01-15
Import patches-applied version 4.0.7-5 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2017-01-15 16:49:05 UTC

Import patches-applied version 4.0.7-5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 46b039177d5a52426b0c40ea6703ce253ad9e0e5
Unapplied parent: dc07ad91dd897c7a6ce0ca7088dc4858f9289dd7

New changelog entries:
  * Fix CVE-2017-5225: heap buffer overflow via a crafted BitsPerSample value
    (closes: #851297).

ubuntu/zesty-proposed 2017-01-15 22:22:48 UTC 2017-01-15
Import patches-unapplied version 4.0.7-5 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2017-01-15 16:49:05 UTC

Import patches-unapplied version 4.0.7-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d116df258b294504bdf2aaccbebd01a40959e6b2

New changelog entries:
  * Fix CVE-2017-5225: heap buffer overflow via a crafted BitsPerSample value
    (closes: #851297).

ubuntu/zesty-devel 2017-01-15 22:22:48 UTC 2017-01-15
Import patches-unapplied version 4.0.7-5 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2017-01-15 16:49:05 UTC

Import patches-unapplied version 4.0.7-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d116df258b294504bdf2aaccbebd01a40959e6b2

New changelog entries:
  * Fix CVE-2017-5225: heap buffer overflow via a crafted BitsPerSample value
    (closes: #851297).

applied/ubuntu/zesty-proposed 2017-01-15 22:22:48 UTC 2017-01-15
Import patches-applied version 4.0.7-5 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2017-01-15 16:49:05 UTC

Import patches-applied version 4.0.7-5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 46b039177d5a52426b0c40ea6703ce253ad9e0e5
Unapplied parent: dc07ad91dd897c7a6ce0ca7088dc4858f9289dd7

New changelog entries:
  * Fix CVE-2017-5225: heap buffer overflow via a crafted BitsPerSample value
    (closes: #851297).

applied/ubuntu/zesty-devel 2017-01-15 22:22:48 UTC 2017-01-15
Import patches-applied version 4.0.7-5 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2017-01-15 16:49:05 UTC

Import patches-applied version 4.0.7-5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 46b039177d5a52426b0c40ea6703ce253ad9e0e5
Unapplied parent: dc07ad91dd897c7a6ce0ca7088dc4858f9289dd7

New changelog entries:
  * Fix CVE-2017-5225: heap buffer overflow via a crafted BitsPerSample value
    (closes: #851297).

applied/ubuntu/yakkety 2016-07-16 22:28:25 UTC 2016-07-16
Import patches-applied version 4.0.6-2 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2016-07-16 11:45:21 UTC

Import patches-applied version 4.0.6-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 9362f5c314f34fd7b6611a33fe1bab845e34c539
Unapplied parent: 36dad5e756c47ec31ea1575a1201aa5c852973d8

New changelog entries:
  * Backport fix for the following vulnerabilities:
    - CVE-2016-5314, PixarLogDecode() heap-based buffer overflow
      (closes: #830700),
    - CVE-2016-5316, PixarLogCleanup() Segmentation fault,
    - CVE-2016-5320, rgb2ycbcr: command excution,
    - CVE-2016-5875, heap-based buffer overflow when using the PixarLog
      compression format,
    - CVE-2016-6223, information leak in libtiff/tif_read.c ,
    - CVE-2016-5321, DumpModeDecode(): Ddos,
    - CVE-2016-5323, tiffcrop _TIFFFax3fillruns(): NULL pointer dereference.
  * Be primary maintainer and keep Ondřej as uploader.
  * Update Standards-Version to 3.9.8 .

ubuntu/yakkety 2016-07-16 22:28:25 UTC 2016-07-16
Import patches-unapplied version 4.0.6-2 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2016-07-16 11:45:21 UTC

Import patches-unapplied version 4.0.6-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 736610d5825ac7e68d826aa353d27c37a4947bdf

New changelog entries:
  * Backport fix for the following vulnerabilities:
    - CVE-2016-5314, PixarLogDecode() heap-based buffer overflow
      (closes: #830700),
    - CVE-2016-5316, PixarLogCleanup() Segmentation fault,
    - CVE-2016-5320, rgb2ycbcr: command excution,
    - CVE-2016-5875, heap-based buffer overflow when using the PixarLog
      compression format,
    - CVE-2016-6223, information leak in libtiff/tif_read.c ,
    - CVE-2016-5321, DumpModeDecode(): Ddos,
    - CVE-2016-5323, tiffcrop _TIFFFax3fillruns(): NULL pointer dereference.
  * Be primary maintainer and keep Ondřej as uploader.
  * Update Standards-Version to 3.9.8 .

ubuntu/yakkety-proposed 2016-07-16 22:28:25 UTC 2016-07-16
Import patches-unapplied version 4.0.6-2 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2016-07-16 11:45:21 UTC

Import patches-unapplied version 4.0.6-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 736610d5825ac7e68d826aa353d27c37a4947bdf

New changelog entries:
  * Backport fix for the following vulnerabilities:
    - CVE-2016-5314, PixarLogDecode() heap-based buffer overflow
      (closes: #830700),
    - CVE-2016-5316, PixarLogCleanup() Segmentation fault,
    - CVE-2016-5320, rgb2ycbcr: command excution,
    - CVE-2016-5875, heap-based buffer overflow when using the PixarLog
      compression format,
    - CVE-2016-6223, information leak in libtiff/tif_read.c ,
    - CVE-2016-5321, DumpModeDecode(): Ddos,
    - CVE-2016-5323, tiffcrop _TIFFFax3fillruns(): NULL pointer dereference.
  * Be primary maintainer and keep Ondřej as uploader.
  * Update Standards-Version to 3.9.8 .

applied/ubuntu/yakkety-proposed 2016-07-16 22:28:25 UTC 2016-07-16
Import patches-applied version 4.0.6-2 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2016-07-16 11:45:21 UTC

Import patches-applied version 4.0.6-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 9362f5c314f34fd7b6611a33fe1bab845e34c539
Unapplied parent: 36dad5e756c47ec31ea1575a1201aa5c852973d8

New changelog entries:
  * Backport fix for the following vulnerabilities:
    - CVE-2016-5314, PixarLogDecode() heap-based buffer overflow
      (closes: #830700),
    - CVE-2016-5316, PixarLogCleanup() Segmentation fault,
    - CVE-2016-5320, rgb2ycbcr: command excution,
    - CVE-2016-5875, heap-based buffer overflow when using the PixarLog
      compression format,
    - CVE-2016-6223, information leak in libtiff/tif_read.c ,
    - CVE-2016-5321, DumpModeDecode(): Ddos,
    - CVE-2016-5323, tiffcrop _TIFFFax3fillruns(): NULL pointer dereference.
  * Be primary maintainer and keep Ondřej as uploader.
  * Update Standards-Version to 3.9.8 .

debian/wheezy 2016-06-05 05:41:55 UTC 2016-06-05
Import patches-unapplied version 4.0.2-6+deb7u5 to debian/wheezy

Author: Laszlo Boszormenyi
Author Date: 2016-01-02 08:51:18 UTC

Import patches-unapplied version 4.0.2-6+deb7u5 to debian/wheezy

Imported using git-ubuntu import.

Changelog parent: 4b060a946c3ef45d6cfe2bd63101287c6cabb07a

New changelog entries:
  * Backport upstream fixes for:
    - CVE-2015-8665 an out-of-bound read in TIFFRGBAImage interface
      (closes: #808968),
    - CVE-2015-8683 an out-of-bounds read in CIE Lab image format
      (closes: #809021),
    - CVE-2015-8781 out of bounds write at tif_luv.c:208,
    - CVE-2015-8782 potential out-of-bound writes in decode,
    - CVE-2015-8783 potential out-of-bound reads in case of short input data,
    - CVE-2015-8784 potential out-of-bound write in NeXTDecode().

applied/debian/wheezy 2016-06-05 05:41:55 UTC 2016-06-05
Import patches-applied version 4.0.2-6+deb7u5 to applied/debian/wheezy

Author: Laszlo Boszormenyi
Author Date: 2016-01-02 08:51:18 UTC

Import patches-applied version 4.0.2-6+deb7u5 to applied/debian/wheezy

Imported using git-ubuntu import.

Changelog parent: 4a8d7fdacc23995772a7bb7e37b71e547eb51017
Unapplied parent: b2cdd83241aa49095210cf2ef8ceca07c957d959

New changelog entries:
  * Backport upstream fixes for:
    - CVE-2015-8665 an out-of-bound read in TIFFRGBAImage interface
      (closes: #808968),
    - CVE-2015-8683 an out-of-bounds read in CIE Lab image format
      (closes: #809021),
    - CVE-2015-8781 out of bounds write at tif_luv.c:208,
    - CVE-2015-8782 potential out-of-bound writes in decode,
    - CVE-2015-8783 potential out-of-bound reads in case of short input data,
    - CVE-2015-8784 potential out-of-bound write in NeXTDecode().

ubuntu/precise-updates 2016-03-23 19:23:40 UTC 2016-03-23
Import patches-unapplied version 3.9.5-2ubuntu1.9 to ubuntu/precise-security

Author: Marc Deslauriers
Author Date: 2016-03-23 14:39:37 UTC

Import patches-unapplied version 3.9.5-2ubuntu1.9 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 29a65980a41fd7d7818a83f1d14e3b42014ccc8f

New changelog entries:
  * SECURITY UPDATE: out-of-bounds reads in TIFFRGBAImage
    - debian/patches/CVE-2015-8665-8683.patch: fix out-of-bounds reads in
      libtiff/tif_getimage.c.
    - CVE-2015-8665
    - CVE-2015-8683
  * SECURITY UPDATE: out-of-bounds writes in decode function
    - debian/patches/CVE-2015-8781-8782-8783.patch: fix out-of-bounds
      writes and an out-of-bounds read in libtiff/tif_luv.c.
    - CVE-2015-8781
    - CVE-2015-8782
    - CVE-2015-8783
  * SECURITY UPDATE: out-of-bounds write in NeXTDecode()
    - debian/patches/CVE-2015-8784.patch: fix out-of-bounds write in
      libtiff/tif_next.c.
    - CVE-2015-8784

ubuntu/wily-security 2016-03-23 19:23:40 UTC 2016-03-23
Import patches-unapplied version 4.0.3-12.3ubuntu2.1 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-03-23 14:23:06 UTC

Import patches-unapplied version 4.0.3-12.3ubuntu2.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: f550f71dca25f17a946130d3df69defe3a487161

New changelog entries:
  * SECURITY UPDATE: out-of-bounds reads in TIFFRGBAImage
    - debian/patches/CVE-2015-8665-8683.patch: fix out-of-bounds reads in
      libtiff/tif_getimage.c.
    - CVE-2015-8665
    - CVE-2015-8683
  * SECURITY UPDATE: out-of-bounds writes in decode function
    - debian/patches/CVE-2015-8781-8782-8783.patch: fix out-of-bounds
      writes and an out-of-bounds read in libtiff/tif_luv.c.
    - CVE-2015-8781
    - CVE-2015-8782
    - CVE-2015-8783
  * SECURITY UPDATE: out-of-bounds write in NeXTDecode()
    - debian/patches/CVE-2015-8784.patch: fix out-of-bounds write in
      libtiff/tif_next.c.
    - CVE-2015-8784

applied/ubuntu/wily-devel 2016-03-23 19:23:40 UTC 2016-03-23
Import patches-applied version 4.0.3-12.3ubuntu2.1 to applied/ubuntu/wily-sec...

Author: Marc Deslauriers
Author Date: 2016-03-23 14:23:06 UTC

Import patches-applied version 4.0.3-12.3ubuntu2.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 5fbecd73a4e960fb2a4011627ffd5cdedf0d25cc
Unapplied parent: fc9929f0dfc955e25e1df73e0c88c6665270da81

New changelog entries:
  * SECURITY UPDATE: out-of-bounds reads in TIFFRGBAImage
    - debian/patches/CVE-2015-8665-8683.patch: fix out-of-bounds reads in
      libtiff/tif_getimage.c.
    - CVE-2015-8665
    - CVE-2015-8683
  * SECURITY UPDATE: out-of-bounds writes in decode function
    - debian/patches/CVE-2015-8781-8782-8783.patch: fix out-of-bounds
      writes and an out-of-bounds read in libtiff/tif_luv.c.
    - CVE-2015-8781
    - CVE-2015-8782
    - CVE-2015-8783
  * SECURITY UPDATE: out-of-bounds write in NeXTDecode()
    - debian/patches/CVE-2015-8784.patch: fix out-of-bounds write in
      libtiff/tif_next.c.
    - CVE-2015-8784

applied/ubuntu/wily-security 2016-03-23 19:23:40 UTC 2016-03-23
Import patches-applied version 4.0.3-12.3ubuntu2.1 to applied/ubuntu/wily-sec...

Author: Marc Deslauriers
Author Date: 2016-03-23 14:23:06 UTC

Import patches-applied version 4.0.3-12.3ubuntu2.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 5fbecd73a4e960fb2a4011627ffd5cdedf0d25cc
Unapplied parent: fc9929f0dfc955e25e1df73e0c88c6665270da81

New changelog entries:
  * SECURITY UPDATE: out-of-bounds reads in TIFFRGBAImage
    - debian/patches/CVE-2015-8665-8683.patch: fix out-of-bounds reads in
      libtiff/tif_getimage.c.
    - CVE-2015-8665
    - CVE-2015-8683
  * SECURITY UPDATE: out-of-bounds writes in decode function
    - debian/patches/CVE-2015-8781-8782-8783.patch: fix out-of-bounds
      writes and an out-of-bounds read in libtiff/tif_luv.c.
    - CVE-2015-8781
    - CVE-2015-8782
    - CVE-2015-8783
  * SECURITY UPDATE: out-of-bounds write in NeXTDecode()
    - debian/patches/CVE-2015-8784.patch: fix out-of-bounds write in
      libtiff/tif_next.c.
    - CVE-2015-8784

applied/ubuntu/precise-updates 2016-03-23 19:23:40 UTC 2016-03-23
Import patches-applied version 3.9.5-2ubuntu1.9 to applied/ubuntu/precise-sec...

Author: Marc Deslauriers
Author Date: 2016-03-23 14:39:37 UTC

Import patches-applied version 3.9.5-2ubuntu1.9 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: e815af0dcd0a5d4cc7c2c32bc206b8df7de15b12
Unapplied parent: 11bc0dd3be4c59a2e5532b21f96c18759661eeb2

New changelog entries:
  * SECURITY UPDATE: out-of-bounds reads in TIFFRGBAImage
    - debian/patches/CVE-2015-8665-8683.patch: fix out-of-bounds reads in
      libtiff/tif_getimage.c.
    - CVE-2015-8665
    - CVE-2015-8683
  * SECURITY UPDATE: out-of-bounds writes in decode function
    - debian/patches/CVE-2015-8781-8782-8783.patch: fix out-of-bounds
      writes and an out-of-bounds read in libtiff/tif_luv.c.
    - CVE-2015-8781
    - CVE-2015-8782
    - CVE-2015-8783
  * SECURITY UPDATE: out-of-bounds write in NeXTDecode()
    - debian/patches/CVE-2015-8784.patch: fix out-of-bounds write in
      libtiff/tif_next.c.
    - CVE-2015-8784

ubuntu/precise-devel 2016-03-23 19:23:40 UTC 2016-03-23
Import patches-unapplied version 3.9.5-2ubuntu1.9 to ubuntu/precise-security

Author: Marc Deslauriers
Author Date: 2016-03-23 14:39:37 UTC

Import patches-unapplied version 3.9.5-2ubuntu1.9 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 29a65980a41fd7d7818a83f1d14e3b42014ccc8f

New changelog entries:
  * SECURITY UPDATE: out-of-bounds reads in TIFFRGBAImage
    - debian/patches/CVE-2015-8665-8683.patch: fix out-of-bounds reads in
      libtiff/tif_getimage.c.
    - CVE-2015-8665
    - CVE-2015-8683
  * SECURITY UPDATE: out-of-bounds writes in decode function
    - debian/patches/CVE-2015-8781-8782-8783.patch: fix out-of-bounds
      writes and an out-of-bounds read in libtiff/tif_luv.c.
    - CVE-2015-8781
    - CVE-2015-8782
    - CVE-2015-8783
  * SECURITY UPDATE: out-of-bounds write in NeXTDecode()
    - debian/patches/CVE-2015-8784.patch: fix out-of-bounds write in
      libtiff/tif_next.c.
    - CVE-2015-8784

applied/ubuntu/precise-security 2016-03-23 19:23:40 UTC 2016-03-23
Import patches-applied version 3.9.5-2ubuntu1.9 to applied/ubuntu/precise-sec...

Author: Marc Deslauriers
Author Date: 2016-03-23 14:39:37 UTC

Import patches-applied version 3.9.5-2ubuntu1.9 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: e815af0dcd0a5d4cc7c2c32bc206b8df7de15b12
Unapplied parent: 11bc0dd3be4c59a2e5532b21f96c18759661eeb2

New changelog entries:
  * SECURITY UPDATE: out-of-bounds reads in TIFFRGBAImage
    - debian/patches/CVE-2015-8665-8683.patch: fix out-of-bounds reads in
      libtiff/tif_getimage.c.
    - CVE-2015-8665
    - CVE-2015-8683
  * SECURITY UPDATE: out-of-bounds writes in decode function
    - debian/patches/CVE-2015-8781-8782-8783.patch: fix out-of-bounds
      writes and an out-of-bounds read in libtiff/tif_luv.c.
    - CVE-2015-8781
    - CVE-2015-8782
    - CVE-2015-8783
  * SECURITY UPDATE: out-of-bounds write in NeXTDecode()
    - debian/patches/CVE-2015-8784.patch: fix out-of-bounds write in
      libtiff/tif_next.c.
    - CVE-2015-8784

applied/ubuntu/precise-devel 2016-03-23 19:23:40 UTC 2016-03-23
Import patches-applied version 3.9.5-2ubuntu1.9 to applied/ubuntu/precise-sec...

Author: Marc Deslauriers
Author Date: 2016-03-23 14:39:37 UTC

Import patches-applied version 3.9.5-2ubuntu1.9 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: e815af0dcd0a5d4cc7c2c32bc206b8df7de15b12
Unapplied parent: 11bc0dd3be4c59a2e5532b21f96c18759661eeb2

New changelog entries:
  * SECURITY UPDATE: out-of-bounds reads in TIFFRGBAImage
    - debian/patches/CVE-2015-8665-8683.patch: fix out-of-bounds reads in
      libtiff/tif_getimage.c.
    - CVE-2015-8665
    - CVE-2015-8683
  * SECURITY UPDATE: out-of-bounds writes in decode function
    - debian/patches/CVE-2015-8781-8782-8783.patch: fix out-of-bounds
      writes and an out-of-bounds read in libtiff/tif_luv.c.
    - CVE-2015-8781
    - CVE-2015-8782
    - CVE-2015-8783
  * SECURITY UPDATE: out-of-bounds write in NeXTDecode()
    - debian/patches/CVE-2015-8784.patch: fix out-of-bounds write in
      libtiff/tif_next.c.
    - CVE-2015-8784

applied/ubuntu/wily-updates 2016-03-23 19:23:40 UTC 2016-03-23
Import patches-applied version 4.0.3-12.3ubuntu2.1 to applied/ubuntu/wily-sec...

Author: Marc Deslauriers
Author Date: 2016-03-23 14:23:06 UTC

Import patches-applied version 4.0.3-12.3ubuntu2.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 5fbecd73a4e960fb2a4011627ffd5cdedf0d25cc
Unapplied parent: fc9929f0dfc955e25e1df73e0c88c6665270da81

New changelog entries:
  * SECURITY UPDATE: out-of-bounds reads in TIFFRGBAImage
    - debian/patches/CVE-2015-8665-8683.patch: fix out-of-bounds reads in
      libtiff/tif_getimage.c.
    - CVE-2015-8665
    - CVE-2015-8683
  * SECURITY UPDATE: out-of-bounds writes in decode function
    - debian/patches/CVE-2015-8781-8782-8783.patch: fix out-of-bounds
      writes and an out-of-bounds read in libtiff/tif_luv.c.
    - CVE-2015-8781
    - CVE-2015-8782
    - CVE-2015-8783
  * SECURITY UPDATE: out-of-bounds write in NeXTDecode()
    - debian/patches/CVE-2015-8784.patch: fix out-of-bounds write in
      libtiff/tif_next.c.
    - CVE-2015-8784

ubuntu/precise-security 2016-03-23 19:23:40 UTC 2016-03-23
Import patches-unapplied version 3.9.5-2ubuntu1.9 to ubuntu/precise-security

Author: Marc Deslauriers
Author Date: 2016-03-23 14:39:37 UTC

Import patches-unapplied version 3.9.5-2ubuntu1.9 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 29a65980a41fd7d7818a83f1d14e3b42014ccc8f

New changelog entries:
  * SECURITY UPDATE: out-of-bounds reads in TIFFRGBAImage
    - debian/patches/CVE-2015-8665-8683.patch: fix out-of-bounds reads in
      libtiff/tif_getimage.c.
    - CVE-2015-8665
    - CVE-2015-8683
  * SECURITY UPDATE: out-of-bounds writes in decode function
    - debian/patches/CVE-2015-8781-8782-8783.patch: fix out-of-bounds
      writes and an out-of-bounds read in libtiff/tif_luv.c.
    - CVE-2015-8781
    - CVE-2015-8782
    - CVE-2015-8783
  * SECURITY UPDATE: out-of-bounds write in NeXTDecode()
    - debian/patches/CVE-2015-8784.patch: fix out-of-bounds write in
      libtiff/tif_next.c.
    - CVE-2015-8784

ubuntu/wily-devel 2016-03-23 19:23:40 UTC 2016-03-23
Import patches-unapplied version 4.0.3-12.3ubuntu2.1 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-03-23 14:23:06 UTC

Import patches-unapplied version 4.0.3-12.3ubuntu2.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: f550f71dca25f17a946130d3df69defe3a487161

New changelog entries:
  * SECURITY UPDATE: out-of-bounds reads in TIFFRGBAImage
    - debian/patches/CVE-2015-8665-8683.patch: fix out-of-bounds reads in
      libtiff/tif_getimage.c.
    - CVE-2015-8665
    - CVE-2015-8683
  * SECURITY UPDATE: out-of-bounds writes in decode function
    - debian/patches/CVE-2015-8781-8782-8783.patch: fix out-of-bounds
      writes and an out-of-bounds read in libtiff/tif_luv.c.
    - CVE-2015-8781
    - CVE-2015-8782
    - CVE-2015-8783
  * SECURITY UPDATE: out-of-bounds write in NeXTDecode()
    - debian/patches/CVE-2015-8784.patch: fix out-of-bounds write in
      libtiff/tif_next.c.
    - CVE-2015-8784

ubuntu/wily-updates 2016-03-23 19:23:40 UTC 2016-03-23
Import patches-unapplied version 4.0.3-12.3ubuntu2.1 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-03-23 14:23:06 UTC

Import patches-unapplied version 4.0.3-12.3ubuntu2.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: f550f71dca25f17a946130d3df69defe3a487161

New changelog entries:
  * SECURITY UPDATE: out-of-bounds reads in TIFFRGBAImage
    - debian/patches/CVE-2015-8665-8683.patch: fix out-of-bounds reads in
      libtiff/tif_getimage.c.
    - CVE-2015-8665
    - CVE-2015-8683
  * SECURITY UPDATE: out-of-bounds writes in decode function
    - debian/patches/CVE-2015-8781-8782-8783.patch: fix out-of-bounds
      writes and an out-of-bounds read in libtiff/tif_luv.c.
    - CVE-2015-8781
    - CVE-2015-8782
    - CVE-2015-8783
  * SECURITY UPDATE: out-of-bounds write in NeXTDecode()
    - debian/patches/CVE-2015-8784.patch: fix out-of-bounds write in
      libtiff/tif_next.c.
    - CVE-2015-8784

applied/ubuntu/xenial-proposed 2016-01-01 16:20:10 UTC 2016-01-01
Import patches-applied version 4.0.6-1 to applied/debian/sid

Author: Laszlo Boszormenyi
Author Date: 2015-12-31 15:22:24 UTC

Import patches-applied version 4.0.6-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: d958b3f732ea4eae73a9bf475353f8ecf6bbde6a
Unapplied parent: 31b4946e60db41a8989675af64028546eb08c74d

New changelog entries:
  * New upstream release.
  * Backport upstream fixes for:
    - CVE-2015-8665 an out-of-bound read in TIFFRGBAImage interface,
    - CVE-2015-8683 an out-of-bounds read in CIE Lab image format.
  * Backport fix for potential out-of-bound writes in decode.
  * Backport fix for potential out-of-bound write in NeXTDecode().

ubuntu/xenial-proposed 2016-01-01 16:20:10 UTC 2016-01-01
Import patches-unapplied version 4.0.6-1 to debian/sid

Author: Laszlo Boszormenyi
Author Date: 2015-12-31 15:22:24 UTC

Import patches-unapplied version 4.0.6-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 97a5fccda0b524be503ba5aad22690e18e876df6

New changelog entries:
  * New upstream release.
  * Backport upstream fixes for:
    - CVE-2015-8665 an out-of-bound read in TIFFRGBAImage interface,
    - CVE-2015-8683 an out-of-bounds read in CIE Lab image format.
  * Backport fix for potential out-of-bound writes in decode.
  * Backport fix for potential out-of-bound write in NeXTDecode().

1100 of 270 results

Other repositories

Name Last Modified
lp:ubuntu/+source/tiff 2019-08-21
11 of 1 result
You can't create new repositories for tiff in Ubuntu.