| Commit message (Expand) | Author | Age | Files | Lines |
* | libtiff 4.0.8 releasedRelease-v4-0-8 | bfriesen | 2017-05-21 | 9 | -37/+25 |
* | html/v4.0.8.html: Add description of changes targeting the 4.0.8 release. | bfriesen | 2017-05-21 | 6 | -18/+456 |
* | * libtiff/tif_getimage.c: initYCbCrConversion(): stricter validation for | erouault | 2017-05-20 | 2 | -8/+20 |
* | * libtiff/tif_getimage.c: initYCbCrConversion(): check luma[1] is not zero | erouault | 2017-05-18 | 2 | -1/+10 |
* | * libtiff/tif_read.c: _TIFFVSetField(): fix outside range cast of double to | erouault | 2017-05-17 | 2 | -2/+8 |
* | * libtiff/tif_getimage.c: initYCbCrConversion(): add basic validation of | erouault | 2017-05-17 | 2 | -1/+32 |
* | * libtiff/tif_pixarlog.c: PixarLogDecode(): resync tif_rawcp with | erouault | 2017-05-17 | 2 | -1/+16 |
* | * libtiff/tif_lzw.c: update dec_bitsleft at beginning of LZWDecode(), | erouault | 2017-05-17 | 2 | -2/+13 |
* | * libtiff/tif_luv.c: LogL16InitState(): avoid excessive memory | erouault | 2017-05-14 | 2 | -2/+10 |
* | * libtiff/tif_packbits.c: fix out-of-buffer read in PackBitsDecode() | erouault | 2017-05-14 | 2 | -1/+13 |
* | * libtiff/tif_pixarlog.c, tif_luv.c: avoid potential int32 | erouault | 2017-05-13 | 3 | -20/+26 |
* | * libtiff/tif_color.c: avoid potential int32 overflow in | erouault | 2017-05-13 | 2 | -10/+37 |
* | * libtiff/tif_read.c: update tif_rawcc in CHUNKY_STRIP_READ_SUPPORT | erouault | 2017-05-13 | 2 | -2/+17 |
* | * libtiff/tif_read.c: TIFFFillStripPartial(): | erouault | 2017-05-12 | 2 | -122/+137 |
* | * libtiff/tif_read.c: TIFFFillStripPartial() / TIFFSeek(), | erouault | 2017-05-12 | 2 | -4/+30 |
* | Rename variable added in previous commit to avoid symbol clash | erouault | 2017-05-10 | 1 | -5/+5 |
* | * libtiff/tif_read.c: TIFFFillStrip() and TIFFFillTile(): | erouault | 2017-05-10 | 2 | -13/+191 |
* | * libtiff/tif_zip.c, tif_pixarlog.c, tif_predict.c: fix memory | erouault | 2017-05-10 | 4 | -4/+24 |
* | * libtiff/tif_read.c: TIFFFillStrip(): add limitation to the number | erouault | 2017-05-10 | 2 | -1/+40 |
* | * tools/tiff2bw.c: close TIFF handle in error code path. | erouault | 2017-04-28 | 2 | -1/+13 |
* | * litiff/tif_fax3.c: avoid crash in Fax3Close() on empty file. | erouault | 2017-04-27 | 3 | -3/+17 |
* | * libtiff/tif_ojpeg.c: fix potential memory leak in | erouault | 2017-04-27 | 2 | -2/+17 |
* | * libtiff/tif_dirread.c: fix memory leak in non DEFER_STRILE_LOAD | erouault | 2017-04-27 | 3 | -3/+32 |
* | * libtiff/tif_fax3.c, tif_predict.c, tif_getimage.c: fix GCC 7 | erouault | 2017-02-25 | 4 | -32/+72 |
* | * libtiff/tif_pixarlog.c: fix memory leak in error code path of | erouault | 2017-02-18 | 2 | -1/+13 |
* | * libtiff/tif_lzw.c: in LZWPostEncode(), increase, if necessary, the | erouault | 2017-02-18 | 2 | -1/+27 |
* | * libtiff/tif_jpeg.c: only run JPEGFixupTagsSubsampling() if the | erouault | 2017-01-31 | 2 | -2/+10 |
* | * tools/raw2tiff.c: avoid integer division by zero. | erouault | 2017-01-14 | 2 | -2/+13 |
* | * libtiff/tif_ojpeg.c: fix leak in OJPEGReadHeaderInfoSecTablesQTable, | erouault | 2017-01-12 | 2 | -2/+9 |
* | * libtiff/tif_ojpeg.c: fix leak in OJPEGReadHeaderInfoSecTablesAcTable | erouault | 2017-01-12 | 2 | -1/+11 |
* | * libtiff/tif_luv.c, tif_lzw.c, tif_packbits.c: return 0 in Encode | erouault | 2017-01-11 | 4 | -12/+20 |
* | * tools/tiffcp.c: error out cleanly in cpContig2SeparateByRow and | erouault | 2017-01-11 | 2 | -3/+30 |
* | Fix commit message | erouault | 2017-01-11 | 1 | -1/+1 |
* | * libtiff/tiffiop.h, tif_unix.c, tif_win32.c, tif_vms.c: add _TIFFcalloc() | erouault | 2017-01-11 | 6 | -6/+41 |
* | Initialize variable to fix MSVC warning (caused by previous commit) | erouault | 2017-01-11 | 1 | -2/+2 |
* | * libtiff/tif_getimage.c: add explicit uint32 cast in putagreytile to | erouault | 2017-01-11 | 2 | -2/+9 |
* | * libtiff/tif_read.c: avoid potential undefined behaviour on signed integer | erouault | 2017-01-11 | 2 | -10/+25 |
* | * libtiff/tif_jpeg.c: validate BitsPerSample in JPEGSetupEncode() to avoid | erouault | 2017-01-11 | 2 | -1/+14 |
* | * libtiff/tif_dir.c, tif_dirread.c, tif_dirwrite.c: implement various clampings | erouault | 2017-01-11 | 4 | -18/+116 |
* | * libtiff/tif_dirread.c: avoid division by floating point 0 in | erouault | 2017-01-11 | 2 | -3/+17 |
* | * libtiff/tif_dirwrite.c: in TIFFWriteDirectoryTagCheckedRational, replace | erouault | 2017-01-11 | 3 | -5/+20 |
* | * libtiff/tif_jpeg.c: avoid integer division by zero in | erouault | 2017-01-11 | 2 | -1/+14 |
* | * libtiff/tif_jpeg.c: increase libjpeg max memory usable to | erouault | 2017-01-03 | 2 | -1/+17 |
* | * tools/tiff2pdf.c: avoid potential heap-based overflow in | erouault | 2016-12-20 | 2 | -2/+8 |
* | * tools/tiff2pdf.c: avoid potential invalid memory read in | erouault | 2016-12-20 | 2 | -9/+17 |
* | * tools/tiff2pdf.c: fix wrong usage of memcpy() that can trigger | erouault | 2016-12-20 | 2 | -2/+9 |
* | * libtiff/tif_getimage.c: fix potential memory leaks in error code | erouault | 2016-12-18 | 2 | -12/+15 |
* | * tools/tiff2pdf.c: prevent heap-based buffer overflow in -j mode | erouault | 2016-12-18 | 2 | -1/+14 |
* | * libtiff/tiffio.h, libtiff/tif_getimage.c: add TIFFReadRGBAStripExt() | erouault | 2016-12-17 | 3 | -4/+26 |
* | * tools/tiff2ps.c: fix 2 heap-based buffer overflows (in PSDataBW | erouault | 2016-12-17 | 2 | -2/+14 |