Your message dated Sat, 25 Jan 2020 19:02:38 +0000
with message-id <[email protected]>
and subject line Bug#945402: fixed in tiff 4.1.0+git191117-2~deb10u1
has caused the Debian Bug report #945402,
regarding regression in OJPEGReadHeaderInfo() parsing
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
945402: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945402
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: feh
Severity: normal

Dear Maintainer,

Up to buster, feh was able to open (a preview of) the raw files
generated by my camera (Canon EOS 1100D); after upgrading to bullseye it
fails with the following error::

    OJPEGDecodeRaw: Inconsistent number of MCU in codestream.
    feh WARNING: 20171230/141140-img_5195.cr2 - No Imlib2 loader for that file 
format

However, after a number of attempts, reading the manpage I noticed that
there is a better way to show raw files in feh, by using dcraw.

I think that having dcraw available in the Suggests of the package would
have helped me find this option much earlier, as that's the first thing
I checked, to see if I was missing some optional dependency.

I'm not sure if it's worth adding to the Recommends instead, as enabling
the use of dcraw is not automatic anyway (it requires the option
--conversion-timeout X with non-negative X, in case somebody finds this
report while having the same issue.)

Thanks for your work on feh

-- System Information:
Debian Release: bullseye/sid
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'testing'), (500, 'stable'), (1, 
'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.2.0-3-amd64 (SMP w/2 CPU cores)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_IE:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: tiff
Source-Version: 4.1.0+git191117-2~deb10u1

We believe that the bug you reported is fixed in the latest version of
tiff, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Laszlo Boszormenyi (GCS) <[email protected]> (supplier of updated tiff package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 12 Jan 2020 17:28:54 +0000
Source: tiff
Architecture: source
Version: 4.1.0+git191117-2~deb10u1
Distribution: buster-security
Urgency: high
Maintainer: Laszlo Boszormenyi (GCS) <[email protected]>
Changed-By: Laszlo Boszormenyi (GCS) <[email protected]>
Closes: 934780 945402
Changes:
 tiff (4.1.0+git191117-2~deb10u1) buster-security; urgency=high
 .
   * Security backport for Buster.
   * Relax Standards-Version to 4.3.0 .
 .
 tiff (4.1.0+git191117-2) unstable; urgency=medium
 .
   * Backport upstream fix for rowsperstrip parse regression in
     OJPEGReadHeaderInfo() (closes: #945402).
 .
 tiff (4.1.0+git191117-1) unstable; urgency=medium
 .
   * Git snapshot, fixing the following issues:
     - missing TIFFClose in rgb2ycbcr tool,
     - missing checks on TIFFGetField in tiffcrop tool,
     - broken sanity check in OJPEG,
     - missing generated .sh files for tests.
 .
 tiff (4.1.0-1) unstable; urgency=medium
 .
   * New upstream release.
   * Update Standards-Version to 4.4.1 .
 .
 tiff (4.0.10+git191003-1) unstable; urgency=high
 .
   * Git snapshot, fixing the following security issue:
     - TIFFReadAndRealloc(): avoid too large memory allocation attempts.
 .
 tiff (4.0.10+git190903-1) unstable; urgency=high
 .
   * Git snapshot, fixing the following security issues:
     - setByteArray(): avoid potential signed integer overflow,
     - EstimateStripByteCounts(): avoid several unsigned integer overflows,
     - tif_ojpeg: avoid two unsigned integer overflows,
     - OJPEGWriteHeaderInfo(): avoid unsigned integer overflow on strile
       dimensions close to UINT32_MAX,
     - _TIFFPartialReadStripArray(): avoid unsigned integer overflow,
     - JPEG: avoid use of uninitialized memory on corrupted files,
     - TIFFFetchDirectory(): fix invalid cast from uint64 to tmsize_t,
     - allocChoppedUpStripArrays(): avoid unsigned integer overflow,
     - tif_ojpeg: avoid use of uninitialized memory on edge/broken file,
     - ByteCountLooksBad and EstimateStripByteCounts: avoid unsigned integer
       overflows.
 .
 tiff (4.0.10+git190818-1) unstable; urgency=high
 .
   * Git snapshot, fixing the following security issues:
     - RGBA interface: fix integer overflow potentially causing write heap
       buffer overflow,
     - setByteArray(): avoid potential signed integer overflow.
 .
 tiff (4.0.10+git190814-1) unstable; urgency=high
 .
   * Git snapshot, fixing the following security issues:
     - TryChopUpUncompressedBigTiff(): avoid potential division by zero,
     - fix vulnerability introduced by defer strile loading,
     - fix vulnerability in 'D' (DeferStrileLoad) mode,
     - return infinite distance when denominator is zero,
     - OJPEG: avoid use of uninitialized memory on corrupted files,
     - OJPEG: fix integer division by zero on corrupted subsampling factors,
     - OJPEGReadBufferFill(): avoid very long processing time on corrupted
       files,
     - TIFFClientOpen(): fix memory leak if one of the required callbacks is
       not provided,
     - CVE-2019-14973, fix integer overflow in _TIFFCheckMalloc() and other
       implementation-defined behaviour (closes: #934780).
   * Update libtiff5 symbols.
   * Update Standards-Version to 4.4.0 .
Checksums-Sha1:
 c09b8de32dc35900d3a1787aa6d72728e92732dd 2274 
tiff_4.1.0+git191117-2~deb10u1.dsc
 19d0d4f42a336cc73060a9c40c21ac45a23d4d41 1533524 
tiff_4.1.0+git191117.orig.tar.xz
 c96a473c6259c8d96e10180c64853ba54a6ea143 19440 
tiff_4.1.0+git191117-2~deb10u1.debian.tar.xz
Checksums-Sha256:
 fc63d46d3fbc75c2f03b09b79f9297d701a2b08c968bc8b5826f9e71df5180c8 2274 
tiff_4.1.0+git191117-2~deb10u1.dsc
 67e1d045e994adb7144b0cca228d70dd6d520aaf8c75c342064bc0fd601e6e42 1533524 
tiff_4.1.0+git191117.orig.tar.xz
 e9dcc77d338663f6be84efe32ae5d4ec9b48923c731aa939f37aa909e60d9f10 19440 
tiff_4.1.0+git191117-2~deb10u1.debian.tar.xz
Files:
 8d6e86fd98221fa11826eba82a82105b 2274 libs optional 
tiff_4.1.0+git191117-2~deb10u1.dsc
 f51040d3436eedde9d3ba7d166754c3e 1533524 libs optional 
tiff_4.1.0+git191117.orig.tar.xz
 09393b26fbbe0e1589b55b8332e405e2 19440 libs optional 
tiff_4.1.0+git191117-2~deb10u1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=QZAs
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to