summaryrefslogtreecommitdiff
path: root/tools
Commit message (Expand)AuthorAgeFilesLines
* * tools/tiff2bw.c (main): Free memory allocated in the tiff2bwbfriesen2017-11-011-12/+28
* tiff2pdf.c: Fix possible overflow in bounds check computation and eliminate s...bfriesen2017-10-291-3/+7
* fax2tiff: Pass the FAX_Client_Data struct as client databfriesen2017-10-292-4/+2
* * tools/tiffset.c: fix setting a single value for the ExtraSamples tagerouault2017-10-011-2/+2
* * tools/tiff2pdf.c: prevent heap buffer overflow write in "Raw"erouault2017-07-151-2/+7
* * refresh autoconf/make stuff with what is on Ubuntu 16.04 (minor changes)erouault2017-07-111-90/+46
* * tools/tiff2bw.c: close TIFF handle in error code path.erouault2017-04-281-1/+8
* * litiff/tif_fax3.c: avoid crash in Fax3Close() on empty file.erouault2017-04-271-1/+5
* * libtiff/tif_dirread.c: fix memory leak in non DEFER_STRILE_LOADerouault2017-04-271-1/+7
* * tools/raw2tiff.c: avoid integer division by zero.erouault2017-01-141-2/+8
* * tools/tiffcp.c: error out cleanly in cpContig2SeparateByRow anderouault2017-01-111-3/+23
* * libtiff/tif_dirwrite.c: in TIFFWriteDirectoryTagCheckedRational, replaceerouault2017-01-111-2/+1
* * tools/tiff2pdf.c: avoid potential heap-based overflow inerouault2016-12-201-2/+2
* * tools/tiff2pdf.c: avoid potential invalid memory read inerouault2016-12-201-9/+11
* * tools/tiff2pdf.c: fix wrong usage of memcpy() that can triggererouault2016-12-201-2/+3
* * tools/tiff2pdf.c: prevent heap-based buffer overflow in -j modeerouault2016-12-181-1/+7
* * tools/tiff2ps.c: fix 2 heap-based buffer overflows (in PSDataBWerouault2016-12-171-2/+7
* * tools/tiffcp.c: replace assert( (bps % 8) == 0 ) by a non assert check.erouault2016-12-031-4/+13
* * tools/tiffcp.c: fix uint32 underflow/overflow that can cause heap-basederouault2016-12-031-4/+4
* * tools/tiffcp.c: avoid potential division by zero is BitsPerSamples tag iserouault2016-12-031-2/+8
* * tools/tiffcp.c: avoid potential division by zero is BitsPerSamples tag iserouault2016-12-031-2/+8
* * tools/tiffinfo.c: fix null pointer dereference in -r mode when the image haserouault2016-12-031-2/+2
* * tools/tiffcrop.c: fix integer division by zero when BitsPerSample is missing.erouault2016-12-031-4/+4
* * tools/tiffcrop.c: add 3 extra bytes at end of strip buffer inerouault2016-12-031-2/+12
* * tools/tiffcrop.c: fix readContigStripsIntoBuffer() in -i (ignore) mode soerouault2016-12-031-2/+2
* * tools/tiffcp.c: avoid uint32 underflow in cpDecodedStrips thaterouault2016-12-021-2/+2
* * tools/fax2tiff.c (main): Applied patch by Jörg Ahrens to fixbfriesen2016-11-201-2/+3
* * tools/tiffdump.c (ReadDirectory): Remove uint32 cast tobfriesen2016-11-191-7/+7
* * tools/tiffcrop.c: Fix memory leak in (recent) error code path.erouault2016-11-181-1/+2
* * tools/tiffinfo.c (TIFFReadContigTileData): Fix signed/unsignedbfriesen2016-11-121-6/+6
* tmsize_t is a signed type so change casting to cast to unsigned type before c...bfriesen2016-11-121-2/+2
* * tools/tiffcrop.c (readContigTilesIntoBuffer): Fixbfriesen2016-11-121-2/+2
* Fix typo in commenterouault2016-11-111-2/+2
* * tools/tiff2pdf.c: avoid undefined behaviour related to overlappingerouault2016-11-111-2/+7
* * tools/tiff2pdf.c: fix potential integer overflows on 32 bit buildserouault2016-11-111-1/+9
* * tools/tiffcrop.c: fix multiple uint32 overflows inerouault2016-11-111-5/+41
* * tools/fax2tiff.c: fix segfault when specifying -r withouterouault2016-10-251-2/+2
* * tools/tiffinfo.c: fix out-of-bound read on some tiled images.erouault2016-10-251-5/+19
* * tools/tiffcrop.c: fix out-of-bound read of up to 3 bytes inerouault2016-10-141-2/+11
* * tools/tiff2pdf.c: fix write buffer overflow of 2 bytes on JPEGerouault2016-10-091-8/+11
* * tools/tiffcp.c: fix out-of-bounds write on tiled images with odderouault2016-10-081-3/+3
* * tools/tiff2pdf.c: fix read -largely- outsize of buffer inerouault2016-10-081-3/+3
* * tools/tiffcp.c: fix read of undefined variable in case of missingerouault2016-10-082-7/+10
* * tools/tiffcrop.c: fix various out-of-bounds write vulnerabilitieserouault2016-09-232-5/+41
* * tools/tiffcrop.c: fix C99'ism.erouault2016-08-161-2/+2
* * tools/tiff2bw.c: fix weight computation that could result of colorerouault2016-08-151-2/+2
* * tools/rgb2ycbcr.c: validate values of -v and -h parameters toerouault2016-08-151-1/+5
* * tools/tiffcrop.c: Fix out-of-bounds write in loadImage().erouault2016-08-151-4/+57
* * tools/tiff2rgba.c: Fix integer overflow in size of allocatederouault2016-08-151-5/+31
* (CVE-2016-5321 / CVE-2016-5323 , bugzilla #2558 / #2559)erouault2016-07-111-9/+9