From 8994e766e2aabba3dd25f74bd2f2e8933fc70b9b Mon Sep 17 00:00:00 2001 From: eabdullin Date: Wed, 14 May 2025 18:09:48 +0000 Subject: [PATCH] import UBI exiv2-0.28.3-3.el10_0.2 --- .exiv2.metadata | 1 - .gitignore | 3 +- exiv2-CVE-2025-26623-test.patch | 68 ++++ exiv2-CVE-2025-26623.patch | 79 +++++ ...iv2-no-rpath.patch => exiv2-no-rpath.patch | 5 +- SPECS/exiv2.spec => exiv2.spec | 320 +++++++++++------- sources | 2 + 7 files changed, 349 insertions(+), 129 deletions(-) delete mode 100644 .exiv2.metadata create mode 100644 exiv2-CVE-2025-26623-test.patch create mode 100644 exiv2-CVE-2025-26623.patch rename SOURCES/exiv2-no-rpath.patch => exiv2-no-rpath.patch (84%) rename SPECS/exiv2.spec => exiv2.spec (55%) create mode 100644 sources diff --git a/.exiv2.metadata b/.exiv2.metadata deleted file mode 100644 index 9bd5035..0000000 --- a/.exiv2.metadata +++ /dev/null @@ -1 +0,0 @@ -775f9c5ddeb92b682da8b7737f9811009595dc6a SOURCES/exiv2-0.27.5-Source.tar.gz diff --git a/.gitignore b/.gitignore index 507135e..35221b7 100644 --- a/.gitignore +++ b/.gitignore @@ -1 +1,2 @@ -SOURCES/exiv2-0.27.5-Source.tar.gz +exiv2-0.28.3.tar.gz +issue_ghsa_38h4_fx85_qcx7_poc.tiff diff --git a/exiv2-CVE-2025-26623-test.patch b/exiv2-CVE-2025-26623-test.patch new file mode 100644 index 0000000..abcb3ef --- /dev/null +++ b/exiv2-CVE-2025-26623-test.patch @@ -0,0 +1,68 @@ +From 630487ffc5feda28aa62dc91eaeae8b0b7507851 Mon Sep 17 00:00:00 2001 +From: Kevin Backhouse +Date: Wed, 19 Feb 2025 16:21:06 +0000 +Subject: [PATCH] Regression test for + https://github.com/Exiv2/exiv2/security/advisories/GHSA-38h4-fx85-qcx7 + +(cherry picked from commit 9f8e1a57b6c6853947360d1187bc24d72056c97a) +--- + test/data/issue_ghsa_38h4_fx85_qcx7_poc.tiff | Bin 0 -> 603 bytes + .../github/test_issue_ghsa_38h4_fx85_qcx7.py | 22 ++++++++++++++++++ + .../test_regression_allfiles.py | 1 + + tests/suite.conf | 1 + + 4 files changed, 24 insertions(+) + create mode 100644 test/data/issue_ghsa_38h4_fx85_qcx7_poc.tiff + create mode 100644 tests/bugfixes/github/test_issue_ghsa_38h4_fx85_qcx7.py + +diff --git a/tests/bugfixes/github/test_issue_ghsa_38h4_fx85_qcx7.py b/tests/bugfixes/github/test_issue_ghsa_38h4_fx85_qcx7.py +new file mode 100644 +index 0000000000..07082caf62 +--- /dev/null ++++ b/tests/bugfixes/github/test_issue_ghsa_38h4_fx85_qcx7.py +@@ -0,0 +1,22 @@ ++# -*- coding: utf-8 -*- ++ ++from system_tests import CaseMeta, path ++ ++ ++class TiffSubIfd_use_after_free(metaclass=CaseMeta): ++ """ ++ Regression test for the bug described in: ++ https://github.com/Exiv2/exiv2/security/advisories/GHSA-38h4-fx85-qcx7 ++ """ ++ ++ url = "https://github.com/Exiv2/exiv2/security/advisories/GHSA-38h4-fx85-qcx7" ++ ++ filename = path("$data_path/issue_ghsa_38h4_fx85_qcx7_poc.tiff") ++ commands = ["$exiv2 -q fi $filename"] ++ stdout = [""] ++ stderr = [ ++ """Exiv2 exception in fixiso action for file $filename: ++$kerImageWriteFailed ++""" ++ ] ++ retval = [1] +diff --git a/tests/regression_tests/test_regression_allfiles.py b/tests/regression_tests/test_regression_allfiles.py +index eb7f7cef2d..53e8de44ae 100644 +--- a/tests/regression_tests/test_regression_allfiles.py ++++ b/tests/regression_tests/test_regression_allfiles.py +@@ -120,6 +120,7 @@ def get_valid_files(data_dir): + "issue_ghsa_mxw9_qx4c_6m8v_poc.jp2", + "issue_ghsa_hrw9_ggg3_3r4r_poc.jpg", + "issue_ghsa_g9xm_7538_mq8w_poc.mov", ++ "issue_ghsa_38h4_fx85_qcx7_poc.tiff", + "pocIssue283.jpg", + "poc_1522.jp2", + "xmpsdk.xmp", +diff --git a/tests/suite.conf b/tests/suite.conf +index c2bf1741e8..249a97fa93 100644 +--- a/tests/suite.conf ++++ b/tests/suite.conf +@@ -41,6 +41,7 @@ jpegparsetest: ${ENV:exiv2_path}/jpegparsetest + kerOffsetOutOfRange: Offset out of range + kerFailedToReadImageData: Failed to read image data + kerInputDataReadFailed: Failed to read input data ++kerImageWriteFailed: Failed to write image + kerCorruptedMetadata: corrupted image metadata + kerInvalidMalloc: invalid memory allocation request + kerInvalidTypeValue: invalid type in tiff structure diff --git a/exiv2-CVE-2025-26623.patch b/exiv2-CVE-2025-26623.patch new file mode 100644 index 0000000..7a14e49 --- /dev/null +++ b/exiv2-CVE-2025-26623.patch @@ -0,0 +1,79 @@ +From facce628f3622764e91a8161f89ade8cb34bc120 Mon Sep 17 00:00:00 2001 +From: Rosen Penev +Date: Mon, 17 Feb 2025 16:34:40 -0800 +Subject: [PATCH] Revert "fix copy constructors" + +This reverts commit afb2d998fe62f7e829e93e62506bf9968117c9c5. + +This commit is wrong and ends up resulting in use after frees because of +C pointers. The proper solution is shared_ptr instead of C pointers but +that's a lot more involved than reverting this. + +Signed-off-by: Rosen Penev +(cherry picked from commit ebff8b48820b96c786cfddbf0bebb395cb1317d7) +--- + src/tiffcomposite_int.cpp | 19 +++++++++++++++++++ + src/tiffcomposite_int.hpp | 6 +++--- + 2 files changed, 22 insertions(+), 3 deletions(-) + +diff --git a/src/tiffcomposite_int.cpp b/src/tiffcomposite_int.cpp +index 95ce450c7d..3e6e93d5c5 100644 +--- a/src/tiffcomposite_int.cpp ++++ b/src/tiffcomposite_int.cpp +@@ -127,6 +127,25 @@ TiffEntryBase::TiffEntryBase(const TiffEntryBase& rhs) : + storage_(rhs.storage_) { + } + ++TiffDirectory::TiffDirectory(const TiffDirectory& rhs) : TiffComponent(rhs), hasNext_(rhs.hasNext_) { ++} ++ ++TiffSubIfd::TiffSubIfd(const TiffSubIfd& rhs) : TiffEntryBase(rhs), newGroup_(rhs.newGroup_) { ++} ++ ++TiffBinaryArray::TiffBinaryArray(const TiffBinaryArray& rhs) : ++ TiffEntryBase(rhs), ++ cfgSelFct_(rhs.cfgSelFct_), ++ arraySet_(rhs.arraySet_), ++ arrayCfg_(rhs.arrayCfg_), ++ arrayDef_(rhs.arrayDef_), ++ defSize_(rhs.defSize_), ++ setSize_(rhs.setSize_), ++ origData_(rhs.origData_), ++ origSize_(rhs.origSize_), ++ pRoot_(rhs.pRoot_) { ++} ++ + TiffComponent::UniquePtr TiffComponent::clone() const { + return UniquePtr(doClone()); + } +diff --git a/src/tiffcomposite_int.hpp b/src/tiffcomposite_int.hpp +index 4506a4dca0..307e0bd9e3 100644 +--- a/src/tiffcomposite_int.hpp ++++ b/src/tiffcomposite_int.hpp +@@ -851,7 +851,7 @@ class TiffDirectory : public TiffComponent { + //! @name Protected Creators + //@{ + //! Copy constructor (used to implement clone()). +- TiffDirectory(const TiffDirectory&) = default; ++ TiffDirectory(const TiffDirectory& rhs); + //@} + + //! @name Protected Manipulators +@@ -944,7 +944,7 @@ class TiffSubIfd : public TiffEntryBase { + //! @name Protected Creators + //@{ + //! Copy constructor (used to implement clone()). +- TiffSubIfd(const TiffSubIfd&) = default; ++ TiffSubIfd(const TiffSubIfd& rhs); + TiffSubIfd& operator=(const TiffSubIfd&) = delete; + //@} + +@@ -1346,7 +1346,7 @@ class TiffBinaryArray : public TiffEntryBase { + //! @name Protected Creators + //@{ + //! Copy constructor (used to implement clone()). +- TiffBinaryArray(const TiffBinaryArray&) = default; ++ TiffBinaryArray(const TiffBinaryArray& rhs); + //@} + + //! @name Protected Manipulators diff --git a/SOURCES/exiv2-no-rpath.patch b/exiv2-no-rpath.patch similarity index 84% rename from SOURCES/exiv2-no-rpath.patch rename to exiv2-no-rpath.patch index 09ff0ef..28a9b54 100644 --- a/SOURCES/exiv2-no-rpath.patch +++ b/exiv2-no-rpath.patch @@ -1,8 +1,8 @@ diff --git a/cmake/mainSetup.cmake b/cmake/mainSetup.cmake -index fcaa21f..f69fc46 100644 +index 1ea9deb..36253d1 100644 --- a/cmake/mainSetup.cmake +++ b/cmake/mainSetup.cmake -@@ -23,8 +23,6 @@ if (UNIX) +@@ -26,8 +26,6 @@ if (UNIX) if (APPLE) set(CMAKE_MACOSX_RPATH ON) set(CMAKE_INSTALL_RPATH "@loader_path") @@ -10,4 +10,3 @@ index fcaa21f..f69fc46 100644 - join_paths(CMAKE_INSTALL_RPATH "$ORIGIN" ".." "${CMAKE_INSTALL_LIBDIR}") endif() endif() - diff --git a/SPECS/exiv2.spec b/exiv2.spec similarity index 55% rename from SPECS/exiv2.spec rename to exiv2.spec index 06966e5..42b136f 100644 --- a/SPECS/exiv2.spec +++ b/exiv2.spec @@ -1,31 +1,48 @@ +Name: exiv2 +Version: 0.28.3 +Release: 3%{?dist}.2 +Summary: Exif and Iptc metadata manipulation library -Summary: Exif and Iptc metadata manipulation library -Name: exiv2 -Version: 0.27.5 -%global internal_ver %{version} -Release: 2%{?dist} +# GPL-2.0-or-later: main library +# BSD-3-Clause: xmpsdk/ +# LicenseRef-Fedora-Public-Domain: +# - app/getopt.cpp +# - src/properties.cpp +# - src/tzfile.h +# - xmpsdk/include/MD5.h +# - xmpsdk/src/MD5.cpp +License: GPL-2.0-or-later AND BSD-3-Clause AND LicenseRef-Fedora-Public-Domain +URL: http://www.exiv2.org/ +VCS: https://github.com/Exiv2/exiv2/ +%if 0%{?beta:1} +Source0: %{vcs}/archive/v%{version}-%{beta}/%{name}-%{version}-%{beta}.tar.gz +%else +Source0: %{vcs}/archive/v%{version}/%{name}-%{version}.tar.gz +%endif -License: GPLv2+ -URL: http://www.exiv2.org/ -Source0: http://exiv2.org/builds/%{name}-%{version}-Source.tar.gz +# POC files for upstream issues +Source1: issue_ghsa_38h4_fx85_qcx7_poc.tiff -## upstream patches (lookaside cache) +Patch0: exiv2-no-rpath.patch -# Security fixes +# CVE fixes +Patch50: exiv2-CVE-2025-26623.patch +Patch51: exiv2-CVE-2025-26623-test.patch -## upstreamable patches -Patch0: exiv2-no-rpath.patch - -BuildRequires: cmake -BuildRequires: expat-devel -BuildRequires: gcc-c++ -BuildRequires: gettext -BuildRequires: pkgconfig -BuildRequires: zlib-devel +BuildRequires: cmake +BuildRequires: gcc-c++ +BuildRequires: gettext +BuildRequires: pkgconfig +BuildRequires: pkgconfig(expat) +BuildRequires: pkgconfig(INIReader) +BuildRequires: pkgconfig(libbrotlidec) +BuildRequires: pkgconfig(zlib) # docs -BuildRequires: doxygen graphviz libxslt +BuildRequires: doxygen +BuildRequires: graphviz +BuildRequires: libxslt -Requires: %{name}-libs%{?_isa} = %{version}-%{release} +Requires: %{name}-libs%{?_isa} = %{?epoch:%{epoch}:}%{version}-%{release} %description A command line utility to access image metadata, allowing one to: @@ -39,182 +56,237 @@ A command line utility to access image metadata, allowing one to: * extract, insert and delete Exif metadata (including thumbnails), Iptc metadata and Jpeg comments -%package devel -Summary: Header files, libraries and development documentation for %{name} -Requires: %{name}-libs%{?_isa} = %{version}-%{release} -%description devel + +%package devel +Summary: Header files, libraries and development documentation for %{name} +Requires: %{name}-libs%{?_isa} = %{?epoch:%{epoch}:}%{version}-%{release} + +%description devel %{summary}. -%package libs -Summary: Exif and Iptc metadata manipulation library + +%package libs +Summary: Exif and Iptc metadata manipulation library # not strictly required, but convenient and expected %if 0%{?rhel} && 0%{?rhel} <= 7 -Requires: %{name} = %{version}-%{release} +Requires: %{name}%{?_isa} = %{?epoch:%{epoch}:}%{version}-%{release} %else -Recommends: %{name} = %{version}-%{release} +Recommends: %{name}%{?_isa} = %{?epoch:%{epoch}:}%{version}-%{release} %endif -%description libs + +%description libs A C++ library to access image metadata, supporting full read and write access to the Exif and Iptc metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd and so on. -%package doc -Summary: Api documentation for %{name} -BuildArch: noarch -%description doc + +%package doc +Summary: API documentation for %{name} +# MIT: +# - clipboard.js +# - cookie.js +# - dynsections.js +# - jquery.js +# - menu.js +# - menudata.js +# - resize.js +# GPL-2.0-only: +# - css and icons from Doxygen +License: MIT AND GPL-2.0-only +BuildArch: noarch + +%description doc %{summary}. +API documentation for %{name}. + %prep -%autosetup -n %{name}-%{version}-Source -p1 +%autosetup -n %{name}-%{version}%{?beta:-%{beta}} -p1 + +cp %{SOURCE1} test/data/issue_ghsa_38h4_fx85_qcx7_poc.tiff %build -%{cmake} . \ +%cmake \ -DCMAKE_INSTALL_DOCDIR="%{_pkgdocdir}" \ -DEXIV2_BUILD_DOC:BOOL=ON \ - -DEXIV2_ENABLE_NLS:BOOL=ON \ - -DEXIV2_BUILD_SAMPLES:BOOL=OFF + -DEXIV2_BUILD_SAMPLES:BOOL=OFF \ + -DEXIV2_ENABLE_NLS:BOOL=ON + +%cmake_build +%cmake_build --target doc -%make_build -%make_build doc %install -make install/fast DESTDIR=%{buildroot} - +%cmake_install %find_lang exiv2 --with-man %check export PKG_CONFIG_PATH="%{buildroot}%{_libdir}/pkgconfig${PKG_CONFIG_PATH:+:}${PKG_CONFIG_PATH}" -test "$(pkg-config --modversion exiv2)" = "%{internal_ver}" +test "$(pkg-config --modversion exiv2)" = "%{version}" test "$(pkg-config --variable=libdir exiv2)" = "%{_libdir}" test -x %{buildroot}%{_libdir}/libexiv2.so +%ctest --parallel 1 %files -f exiv2.lang -%license COPYING -%doc doc/ChangeLog -# README is mostly installation instructions -#doc README.md +%license COPYING doc/COPYING-XMPSDK +%doc doc/ChangeLog exiv2.md SECURITY.md %{_bindir}/exiv2 %{_mandir}/man1/exiv2*.1* -%ldconfig_scriptlets libs %files libs -%{_libdir}/libexiv2.so.27* -%{_libdir}/libexiv2.so.%{internal_ver} +%{_libdir}/libexiv2.so.28* +%{_libdir}/libexiv2.so.%{version} + %files devel %{_includedir}/exiv2/ +%{_libdir}/cmake/exiv2/ %{_libdir}/libexiv2.so %{_libdir}/pkgconfig/exiv2.pc -%{_libdir}/cmake/exiv2/ -# todo: -static subpkg? -- rex -%{_libdir}/libexiv2-xmp.a + %files doc %{_pkgdocdir}/ -%exclude %{_pkgdocdir}/ChangeLog + %changelog -* Mon Nov 15 2021 Jan Grulich - 0.27.5-2 -- Remove RPATH - Resolves: bz#2018422 +* Mon Feb 24 2025 Jan Grulich - 0.28.3-3.2 +- Revert: remove rpath patch + Resolves: RHEL-80105 -* Fri Nov 12 2021 Jan Grulich - 0.27.5-1 -- Exiv2 0.27.5 - Resolves: bz#2018422 +* Mon Feb 24 2025 Jan Grulich - 0.28.3-3.1 +- Fix CVE-2025-26623 exiv2: Use After Free + Resolves: RHEL-80105 - Fix stack exhaustion issue in the printIFDStructure function leading to DoS - Resolves: bz#2003673 +* Tue Oct 29 2024 Troy Dawson - 0.28.3-3 +- Bump release for October 2024 mass rebuild: + Resolves: RHEL-64018 -* Tue Aug 24 2021 Jan Grulich - 0.27.4-5 -- Include missing tests for CVEs - Resolves: bz#1993282 - Resolves: bz#1993245 +* Tue Aug 06 2024 Jan Grulich - 0.28.3-2 +- Backport RHEL9 patch for RPATH + Resolves: RHEL-45267 -* Wed Aug 18 2021 Jan Grulich - 0.27.4-4 -- Fix test for CVE-2021-29470 - Resolves: bz#1993245 +* Tue Aug 06 2024 Jan Grulich - 0.28.3-1 +- 0.28.3 + Resolves: RHEL-45267 -* Wed Aug 18 2021 Jan Grulich - 0.27.4-3 -- Fix out-of-bounds read in Exiv2::Jp2Image::printStructure - Resolves: bz#1993282 +* Mon Jun 24 2024 Troy Dawson - 0.27.6-8 +- Bump release for June 2024 mass rebuild -- Fix out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header - Resolves: bz#1993245 +* Wed Jan 24 2024 Fedora Release Engineering - 0.27.6-7 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild -* Thu Aug 05 2021 Jan Grulich - 0.27.4-2 -- Do not duplicate changelog file - Resolves: bz#1989860 +* Fri Jan 19 2024 Fedora Release Engineering - 0.27.6-6 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild -* Wed Aug 04 2021 Jan Grulich - 0.27.4-1 -- 0.27.4 - Resolves: bz#1989860 +* Wed Jul 19 2023 Fedora Release Engineering - 0.27.6-5 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild + +* Tue Jan 31 2023 Jan Grulich - 0.27.6-1 +- 0.27.6 +- migrated to SPDX license + +* Thu Jan 19 2023 Fedora Release Engineering - 0.27.5-4 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild + +* Thu Jul 21 2022 Fedora Release Engineering - 0.27.5-3 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild + +* Thu Jan 20 2022 Fedora Release Engineering - 0.27.5-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild + +* Wed Oct 27 2021 Rex Dieter - 0.27.5-1 +- 0.27.5 (final) + +* Mon Oct 04 2021 Rex Dieter - 0.27.5-0.3.RC3 +- 0.27-5-RC3 + +* Fri Sep 10 2021 Rex Dieter - 0.27.5-0.2.RC2 +- 0.27.5-RC2 (#2003208) + +* Wed Aug 11 2021 Rex Dieter - 0.27.5-0.1.RC1 +- 0.27.5-RC1 (#1992344) + +* Wed Jul 21 2021 Fedora Release Engineering - 0.27.4-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild + +* Fri Jun 18 2021 Rex Dieter - 0.27.4-1 +- 0.27.4 (#1941230) * Tue May 25 2021 Jan Grulich - 0.27.3-6 - CVE-2021-29623 exiv2: a read of uninitialized memory may lead to information leak - Resolves: bz#1964182 + CVE-2021-32617 exiv2: DoS due to quadratic complexity in ProcessUTF8Portion -- CVE-2021-32617 exiv2: DoS due to quadratic complexity in ProcessUTF8Portion - Resolves: bz#1964188 - -* Thu Apr 29 2021 Jan Grulich - 0.27.3-5 -- CVE-2021-29473 exiv2: out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata - Resolves: bz#1954065 - -- CVE-2021-29470 exiv2: out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header - Resolves: bz#1955014 - -* Wed Apr 28 2021 Jan Grulich - 0.27.3-4 -- CVE-2021-29458 exiv2: out-of-bounds read in Exiv2::Internal::CrwMap::encode - Resolves: bz#1953758 - -- CVE-2021-29457 exiv2: heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata - Resolves: bz#1953772 - -* Wed Apr 14 2021 Jan Grulich - 0.27.3-3 +* Thu Apr 29 2021 Jan Grulich - 0.27.3-6 - CVE-2021-3482: Fix heap-based buffer overflow in Jp2Image::readMetadata() - Resolves: bz#1947160 + CVE-2021-29458 exiv2: out-of-bounds read in Exiv2::Internal::CrwMap::encode + CVE-2021-29457 exiv2: heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata + CVE-2021-29470 exiv2: out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header + CVE-2021-29473 exiv2: out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata -* Wed Oct 7 2020 Jan Grulich - 0.27.3-2 -- Avoid duplicating Changelog file - Resolves: bz#1880984 +* Tue Jan 26 2021 Fedora Release Engineering - 0.27.3-5 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild -* Wed Oct 7 2020 Jan Grulich - 0.27.3-1 -- Update to 0.27.3 - Resolves: bz#1880984 +* Wed Aug 26 2020 Rex Dieter - 0.27.3-4 +- support new cmake macro semantics -* Wed Mar 04 2020 Jan Grulich - 0.27.2-5 -- Fix failing test - Resolves: bz#1800472 +* Sat Aug 01 2020 Fedora Release Engineering - 0.27.3-3 +- Second attempt - Rebuilt for + https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild -* Wed Mar 04 2020 Jan Grulich - 0.27.2-4 -- Drop test for the previous CVE as we test it manually and we don't have POC available - Resolves: bz#1800472 +* Mon Jul 27 2020 Fedora Release Engineering - 0.27.3-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild -* Wed Feb 26 2020 Jan Grulich - 0.27.2-3 -- Fix infinite loop and hang in Jp2Image::readMetadata() - Resolves: bz#1800472 +* Tue Jun 30 2020 Rex Dieter - 0.27.3-1 +- 0.27.3 -* Tue Oct 29 2019 Jan Grulich - 0.27.2-2 - Rebuild - Resolves: bz#1651917 +* Tue Jan 28 2020 Fedora Release Engineering - 0.27.2-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild -* Fri Sep 20 2019 Jan Grulich - 0.27.2-1 -- Update to 0.27.2 - Resolves: bz#1651917 +* Mon Jul 29 2019 Rex Dieter - 0.27.2-1 +- 0.27.2 -* Tue Sep 11 2018 Jan Grulich - 0.26-10 -- Security fix for CVE-2018-16336 +* Thu Jul 25 2019 Fedora Release Engineering - 0.27.2-0.2.RC2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild -* Tue Jul 24 2018 Jan Grulich - 0.26-9 +* Tue Jul 16 2019 Rex Dieter - 0.27.2-0.1.RC2 +- 0.27.2-RC2 (#1720353) + +* Fri Apr 26 2019 Rex Dieter - 0.27.1-1 +- exiv-0.27.1 (#1696117) + +* Thu Jan 31 2019 Rex Dieter - 0.27.0-3 +- -devel: Requires: expat-devel + +* Wed Jan 30 2019 Rex Dieter - 0.27.0-2 +- pull in upstream fix for pkgconfig exiv2.pc + +* Thu Jan 10 2019 Rex Dieter - 0.27.0-1 +- exiv2-0.27.0 (#1665246) + +* Thu Jan 10 2019 Rex Dieter - 0.26-13 +- backport pentax DNG crasher (#1585514, exiv2#201) + +* Tue Jul 24 2018 Jan Grulich - 0.26-12 - Security fix for CVE-2017-17723, CVE-2017-17725, CVE-2018-10958, CVE-2018-10998, CVE-2018-11531, CVE-2018-12264, CVE-2018-12265, CVE-2018-14046, CVE-2018-5772, CVE-2018-8976, CVE-2018-8977, CVE-2018-9144 +* Fri Jul 13 2018 Fedora Release Engineering - 0.26-11 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild + +* Thu May 03 2018 Germano Massullo - 0.26-10 +- added patches that fix CVE-2017-17723 CVE-2017-17725 CVE-2017-5772 +- moved 0006-1296-Fix-submitted.patch file from sources to package tree + +* Tue Feb 20 2018 Rex Dieter - 0.26-9 +- BR: gcc-c++ + * Wed Feb 07 2018 Fedora Release Engineering - 0.26-8 - Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild diff --git a/sources b/sources new file mode 100644 index 0000000..309961e --- /dev/null +++ b/sources @@ -0,0 +1,2 @@ +SHA512 (exiv2-0.28.3.tar.gz) = c8338a118feefa104d73932890c732247c884ab9ce1d170c43a22ab5884517a0e2a7fd1febde7705b8290fbbbc29e64738610404816e4db2b56a70fc444ca049 +SHA512 (issue_ghsa_38h4_fx85_qcx7_poc.tiff) = adaa541625873c88d58a5563e3d345f51252bc83ba487f004e54cd327b48fb2258e5d5cf27547f1da426d2b2a9a21d1f7d6378c877ac073477658fc4b300e5b9