Package: release.debian.org
User: release.debian....@packages.debian.org
Usertags: unblock

Hi Release Team,

Current version of tiff in the archive is 4.0.7 and the package
already have 28 security patches that got attention (CVE id). Upstream
released 4.0.8 which contains only security related changes[1]
including memory leaks, division by zero, undefined behaviour, integer
overflows and excessive memory allocation fixes.
There are no major or software configuration changes[2].

Diffstat between the versions:
 ChangeLog                 |  464 +++++++++++++++++++++++++++++++++++++++++++++-
 RELEASE-DATE              |    2
 VERSION                   |    2
 configure                 |   24 +-
 configure.ac              |    6
 html/Makefile.am          |    3
 html/Makefile.in          |    3
 html/index.html           |    4
 html/man/CMakeLists.txt   |    2
 html/man/Makefile.am      |    2
 html/man/Makefile.in      |    2
 html/man/rgb2ycbcr.1.html |  155 ---------------
 html/man/thumbnail.1.html |  148 --------------
 html/v4.0.7.html          |    2
 html/v4.0.8.html          |  445 ++++++++++++++++++++++++++++++++++++++++++++
 libtiff/tif_color.c       |   40 ++-
 libtiff/tif_dir.c         |   48 ++++
 libtiff/tif_dirread.c     |   62 ++++--
 libtiff/tif_dirwrite.c    |  101 ++++++++--
 libtiff/tif_fax3.c        |   71 +++++--
 libtiff/tif_fax3.h        |    6
 libtiff/tif_getimage.c    |   95 ++++++---
 libtiff/tif_jpeg.c        |   29 ++
 libtiff/tif_luv.c         |   47 ++--
 libtiff/tif_lzw.c         |   33 ++-
 libtiff/tif_ojpeg.c       |   25 ++
 libtiff/tif_open.c        |    6
 libtiff/tif_packbits.c    |   12 -
 libtiff/tif_pixarlog.c    |   60 ++++-
 libtiff/tif_predict.c     |   18 +
 libtiff/tif_print.c       |   10
 libtiff/tif_read.c        |  344 +++++++++++++++++++++++++++++-----
 libtiff/tif_strip.c       |   11 -
 libtiff/tif_unix.c        |   10
 libtiff/tif_win32.c       |   10
 libtiff/tif_write.c       |   32 +--
 libtiff/tif_zip.c         |    8
 libtiff/tiffio.h          |    5
 libtiff/tiffiop.h         |    6
 libtiff/tiffvers.h        |    4
 man/CMakeLists.txt        |    2
 man/Makefile.am           |    2
 man/Makefile.in           |    2
 man/rgb2ycbcr.1           |   99 ---------
 man/thumbnail.1           |   90 --------
 tools/fax2tiff.c          |    9
 tools/raw2tiff.c          |   10
 tools/tiff2bw.c           |    9
 tools/tiff2pdf.c          |   31 +--
 tools/tiff2ps.c           |   15 +
 tools/tiffcp.c            |   65 +++++-
 tools/tiffcrop.c          |   23 +-
 tools/tiffinfo.c          |    4
 53 files changed, 1920 insertions(+), 798 deletions(-)

Tests done.
1) Using it on my Stretch/amd64 machine without problems, including
gimp and firefox.
2) Built successfully on amd64 / arm64 / armel / i386 / mipsel.
3) Built some reverse dependencies with it: graphicsmagick and gimp.

Proposed package is available[3]. Would be nice to upload it to Sid
and target Stretch instead of backporting even more fixes as those get
public exploits and/or CVE ids. Of course, I'm open for even more
testing if that's required.

Thanks for considering,
Laszlo/GCS
[1] http://libtiff.maptools.org/v4.0.8.html#libtiff
[2] http://libtiff.maptools.org/v4.0.8.html#highlights
[3] dget -x http://www.barcikacomp.hu/gcs/tiff_4.0.8-1.dsc

Reply via email to