Compare commits
No commits in common. "c10s" and "c8" have entirely different histories.
1
.exiv2.metadata
Normal file
1
.exiv2.metadata
Normal file
@ -0,0 +1 @@
|
|||||||
|
775f9c5ddeb92b682da8b7737f9811009595dc6a SOURCES/exiv2-0.27.5-Source.tar.gz
|
13
.gitignore
vendored
13
.gitignore
vendored
@ -1,12 +1 @@
|
|||||||
/exiv2-0.27.1-Source.tar.gz
|
SOURCES/exiv2-0.27.5-Source.tar.gz
|
||||||
/v0.27.2-RC2.tar.gz
|
|
||||||
/exiv2-0.27.2-Source.tar.gz
|
|
||||||
/exiv2-0.27.3-Source.tar.gz
|
|
||||||
/exiv2-0.27.4-Source.tar.gz
|
|
||||||
/exiv2-0.27.5-RC1.tar.gz
|
|
||||||
/exiv2-0.27.5-RC2.tar.gz
|
|
||||||
/exiv2-0.27.5-RC3.tar.gz
|
|
||||||
/exiv2-0.27.5-Source.tar.gz
|
|
||||||
/exiv2-0.27.6-Source.tar.gz
|
|
||||||
/exiv2-0.28.3.tar.gz
|
|
||||||
/issue_ghsa_38h4_fx85_qcx7_poc.tiff
|
|
||||||
|
@ -1,8 +1,8 @@
|
|||||||
diff --git a/cmake/mainSetup.cmake b/cmake/mainSetup.cmake
|
diff --git a/cmake/mainSetup.cmake b/cmake/mainSetup.cmake
|
||||||
index 1ea9deb..36253d1 100644
|
index fcaa21f..f69fc46 100644
|
||||||
--- a/cmake/mainSetup.cmake
|
--- a/cmake/mainSetup.cmake
|
||||||
+++ b/cmake/mainSetup.cmake
|
+++ b/cmake/mainSetup.cmake
|
||||||
@@ -26,8 +26,6 @@ if (UNIX)
|
@@ -23,8 +23,6 @@ if (UNIX)
|
||||||
if (APPLE)
|
if (APPLE)
|
||||||
set(CMAKE_MACOSX_RPATH ON)
|
set(CMAKE_MACOSX_RPATH ON)
|
||||||
set(CMAKE_INSTALL_RPATH "@loader_path")
|
set(CMAKE_INSTALL_RPATH "@loader_path")
|
||||||
@ -10,3 +10,4 @@ index 1ea9deb..36253d1 100644
|
|||||||
- join_paths(CMAKE_INSTALL_RPATH "$ORIGIN" ".." "${CMAKE_INSTALL_LIBDIR}")
|
- join_paths(CMAKE_INSTALL_RPATH "$ORIGIN" ".." "${CMAKE_INSTALL_LIBDIR}")
|
||||||
endif()
|
endif()
|
||||||
endif()
|
endif()
|
||||||
|
|
@ -1,48 +1,31 @@
|
|||||||
Name: exiv2
|
|
||||||
Version: 0.28.3
|
|
||||||
Release: 5%{?dist}
|
|
||||||
Summary: Exif and Iptc metadata manipulation library
|
|
||||||
|
|
||||||
# GPL-2.0-or-later: main library
|
Summary: Exif and Iptc metadata manipulation library
|
||||||
# BSD-3-Clause: xmpsdk/
|
Name: exiv2
|
||||||
# LicenseRef-Fedora-Public-Domain:
|
Version: 0.27.5
|
||||||
# - app/getopt.cpp
|
%global internal_ver %{version}
|
||||||
# - src/properties.cpp
|
Release: 2%{?dist}
|
||||||
# - src/tzfile.h
|
|
||||||
# - xmpsdk/include/MD5.h
|
|
||||||
# - xmpsdk/src/MD5.cpp
|
|
||||||
License: GPL-2.0-or-later AND BSD-3-Clause AND LicenseRef-Fedora-Public-Domain
|
|
||||||
URL: http://www.exiv2.org/
|
|
||||||
VCS: https://github.com/Exiv2/exiv2/
|
|
||||||
%if 0%{?beta:1}
|
|
||||||
Source0: %{vcs}/archive/v%{version}-%{beta}/%{name}-%{version}-%{beta}.tar.gz
|
|
||||||
%else
|
|
||||||
Source0: %{vcs}/archive/v%{version}/%{name}-%{version}.tar.gz
|
|
||||||
%endif
|
|
||||||
|
|
||||||
# POC files for upstream issues
|
License: GPLv2+
|
||||||
Source1: issue_ghsa_38h4_fx85_qcx7_poc.tiff
|
URL: http://www.exiv2.org/
|
||||||
|
Source0: http://exiv2.org/builds/%{name}-%{version}-Source.tar.gz
|
||||||
|
|
||||||
Patch0: exiv2-no-rpath.patch
|
## upstream patches (lookaside cache)
|
||||||
|
|
||||||
# CVE fixes
|
# Security fixes
|
||||||
Patch50: exiv2-CVE-2025-26623.patch
|
|
||||||
Patch51: exiv2-CVE-2025-26623-test.patch
|
|
||||||
|
|
||||||
BuildRequires: cmake
|
## upstreamable patches
|
||||||
BuildRequires: gcc-c++
|
Patch0: exiv2-no-rpath.patch
|
||||||
BuildRequires: gettext
|
|
||||||
BuildRequires: pkgconfig
|
BuildRequires: cmake
|
||||||
BuildRequires: pkgconfig(expat)
|
BuildRequires: expat-devel
|
||||||
BuildRequires: pkgconfig(INIReader)
|
BuildRequires: gcc-c++
|
||||||
BuildRequires: pkgconfig(libbrotlidec)
|
BuildRequires: gettext
|
||||||
BuildRequires: pkgconfig(zlib)
|
BuildRequires: pkgconfig
|
||||||
|
BuildRequires: zlib-devel
|
||||||
# docs
|
# docs
|
||||||
BuildRequires: doxygen
|
BuildRequires: doxygen graphviz libxslt
|
||||||
BuildRequires: graphviz
|
|
||||||
BuildRequires: libxslt
|
|
||||||
|
|
||||||
Requires: %{name}-libs%{?_isa} = %{?epoch:%{epoch}:}%{version}-%{release}
|
Requires: %{name}-libs%{?_isa} = %{version}-%{release}
|
||||||
|
|
||||||
%description
|
%description
|
||||||
A command line utility to access image metadata, allowing one to:
|
A command line utility to access image metadata, allowing one to:
|
||||||
@ -56,237 +39,182 @@ A command line utility to access image metadata, allowing one to:
|
|||||||
* extract, insert and delete Exif metadata (including thumbnails),
|
* extract, insert and delete Exif metadata (including thumbnails),
|
||||||
Iptc metadata and Jpeg comments
|
Iptc metadata and Jpeg comments
|
||||||
|
|
||||||
|
%package devel
|
||||||
%package devel
|
Summary: Header files, libraries and development documentation for %{name}
|
||||||
Summary: Header files, libraries and development documentation for %{name}
|
Requires: %{name}-libs%{?_isa} = %{version}-%{release}
|
||||||
Requires: %{name}-libs%{?_isa} = %{?epoch:%{epoch}:}%{version}-%{release}
|
%description devel
|
||||||
|
|
||||||
%description devel
|
|
||||||
%{summary}.
|
%{summary}.
|
||||||
|
|
||||||
|
%package libs
|
||||||
%package libs
|
Summary: Exif and Iptc metadata manipulation library
|
||||||
Summary: Exif and Iptc metadata manipulation library
|
|
||||||
# not strictly required, but convenient and expected
|
# not strictly required, but convenient and expected
|
||||||
%if 0%{?rhel} && 0%{?rhel} <= 7
|
%if 0%{?rhel} && 0%{?rhel} <= 7
|
||||||
Requires: %{name}%{?_isa} = %{?epoch:%{epoch}:}%{version}-%{release}
|
Requires: %{name} = %{version}-%{release}
|
||||||
%else
|
%else
|
||||||
Recommends: %{name}%{?_isa} = %{?epoch:%{epoch}:}%{version}-%{release}
|
Recommends: %{name} = %{version}-%{release}
|
||||||
%endif
|
%endif
|
||||||
|
%description libs
|
||||||
%description libs
|
|
||||||
A C++ library to access image metadata, supporting full read and write access
|
A C++ library to access image metadata, supporting full read and write access
|
||||||
to the Exif and Iptc metadata, Exif MakerNote support, extract and delete
|
to the Exif and Iptc metadata, Exif MakerNote support, extract and delete
|
||||||
methods for Exif thumbnails, classes to access Ifd and so on.
|
methods for Exif thumbnails, classes to access Ifd and so on.
|
||||||
|
|
||||||
|
%package doc
|
||||||
%package doc
|
Summary: Api documentation for %{name}
|
||||||
Summary: API documentation for %{name}
|
BuildArch: noarch
|
||||||
# MIT:
|
%description doc
|
||||||
# - clipboard.js
|
|
||||||
# - cookie.js
|
|
||||||
# - dynsections.js
|
|
||||||
# - jquery.js
|
|
||||||
# - menu.js
|
|
||||||
# - menudata.js
|
|
||||||
# - resize.js
|
|
||||||
# GPL-2.0-only:
|
|
||||||
# - css and icons from Doxygen
|
|
||||||
License: MIT AND GPL-2.0-only
|
|
||||||
BuildArch: noarch
|
|
||||||
|
|
||||||
%description doc
|
|
||||||
%{summary}.
|
%{summary}.
|
||||||
|
|
||||||
API documentation for %{name}.
|
|
||||||
|
|
||||||
|
|
||||||
%prep
|
%prep
|
||||||
%autosetup -n %{name}-%{version}%{?beta:-%{beta}} -p1
|
%autosetup -n %{name}-%{version}-Source -p1
|
||||||
|
|
||||||
cp %{SOURCE1} test/data/issue_ghsa_38h4_fx85_qcx7_poc.tiff
|
|
||||||
|
|
||||||
%build
|
%build
|
||||||
%cmake \
|
%{cmake} . \
|
||||||
-DCMAKE_INSTALL_DOCDIR="%{_pkgdocdir}" \
|
-DCMAKE_INSTALL_DOCDIR="%{_pkgdocdir}" \
|
||||||
-DEXIV2_BUILD_DOC:BOOL=ON \
|
-DEXIV2_BUILD_DOC:BOOL=ON \
|
||||||
-DEXIV2_BUILD_SAMPLES:BOOL=OFF \
|
-DEXIV2_ENABLE_NLS:BOOL=ON \
|
||||||
-DEXIV2_ENABLE_NLS:BOOL=ON
|
-DEXIV2_BUILD_SAMPLES:BOOL=OFF
|
||||||
|
|
||||||
%cmake_build
|
|
||||||
%cmake_build --target doc
|
|
||||||
|
|
||||||
|
%make_build
|
||||||
|
%make_build doc
|
||||||
|
|
||||||
%install
|
%install
|
||||||
%cmake_install
|
make install/fast DESTDIR=%{buildroot}
|
||||||
|
|
||||||
%find_lang exiv2 --with-man
|
%find_lang exiv2 --with-man
|
||||||
|
|
||||||
|
|
||||||
%check
|
%check
|
||||||
export PKG_CONFIG_PATH="%{buildroot}%{_libdir}/pkgconfig${PKG_CONFIG_PATH:+:}${PKG_CONFIG_PATH}"
|
export PKG_CONFIG_PATH="%{buildroot}%{_libdir}/pkgconfig${PKG_CONFIG_PATH:+:}${PKG_CONFIG_PATH}"
|
||||||
test "$(pkg-config --modversion exiv2)" = "%{version}"
|
test "$(pkg-config --modversion exiv2)" = "%{internal_ver}"
|
||||||
test "$(pkg-config --variable=libdir exiv2)" = "%{_libdir}"
|
test "$(pkg-config --variable=libdir exiv2)" = "%{_libdir}"
|
||||||
test -x %{buildroot}%{_libdir}/libexiv2.so
|
test -x %{buildroot}%{_libdir}/libexiv2.so
|
||||||
|
|
||||||
%ctest --parallel 1
|
|
||||||
|
|
||||||
%files -f exiv2.lang
|
%files -f exiv2.lang
|
||||||
%license COPYING doc/COPYING-XMPSDK
|
%license COPYING
|
||||||
%doc doc/ChangeLog exiv2.md SECURITY.md
|
%doc doc/ChangeLog
|
||||||
|
# README is mostly installation instructions
|
||||||
|
#doc README.md
|
||||||
%{_bindir}/exiv2
|
%{_bindir}/exiv2
|
||||||
%{_mandir}/man1/exiv2*.1*
|
%{_mandir}/man1/exiv2*.1*
|
||||||
|
|
||||||
|
%ldconfig_scriptlets libs
|
||||||
|
|
||||||
%files libs
|
%files libs
|
||||||
%{_libdir}/libexiv2.so.28*
|
%{_libdir}/libexiv2.so.27*
|
||||||
%{_libdir}/libexiv2.so.%{version}
|
%{_libdir}/libexiv2.so.%{internal_ver}
|
||||||
|
|
||||||
|
|
||||||
%files devel
|
%files devel
|
||||||
%{_includedir}/exiv2/
|
%{_includedir}/exiv2/
|
||||||
%{_libdir}/cmake/exiv2/
|
|
||||||
%{_libdir}/libexiv2.so
|
%{_libdir}/libexiv2.so
|
||||||
%{_libdir}/pkgconfig/exiv2.pc
|
%{_libdir}/pkgconfig/exiv2.pc
|
||||||
|
%{_libdir}/cmake/exiv2/
|
||||||
|
# todo: -static subpkg? -- rex
|
||||||
|
%{_libdir}/libexiv2-xmp.a
|
||||||
|
|
||||||
%files doc
|
%files doc
|
||||||
%{_pkgdocdir}/
|
%{_pkgdocdir}/
|
||||||
|
%exclude %{_pkgdocdir}/ChangeLog
|
||||||
|
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
* Mon Feb 24 2025 Jan Grulich <jgrulich@redhat.com> - 0.28.3-5
|
* Mon Nov 15 2021 Jan Grulich <jgrulich@redhat.com> - 0.27.5-2
|
||||||
- Revert: remove rpath patch
|
- Remove RPATH
|
||||||
Resolves: RHEL-80106
|
Resolves: bz#2018422
|
||||||
|
|
||||||
* Mon Feb 24 2025 Jan Grulich <jgrulich@redhat.com> - 0.28.3-4
|
* Fri Nov 12 2021 Jan Grulich <jgrulich@redhat.com> - 0.27.5-1
|
||||||
- Fix CVE-2025-26623 exiv2: Use After Free
|
- Exiv2 0.27.5
|
||||||
Resolves: RHEL-80106
|
Resolves: bz#2018422
|
||||||
|
|
||||||
* Tue Oct 29 2024 Troy Dawson <tdawson@redhat.com> - 0.28.3-3
|
Fix stack exhaustion issue in the printIFDStructure function leading to DoS
|
||||||
- Bump release for October 2024 mass rebuild:
|
Resolves: bz#2003673
|
||||||
Resolves: RHEL-64018
|
|
||||||
|
|
||||||
* Tue Aug 06 2024 Jan Grulich <jgrulich@redhat.com> - 0.28.3-2
|
* Tue Aug 24 2021 Jan Grulich <jgrulich@redhat.com> - 0.27.4-5
|
||||||
- Backport RHEL9 patch for RPATH
|
- Include missing tests for CVEs
|
||||||
Resolves: RHEL-45267
|
Resolves: bz#1993282
|
||||||
|
Resolves: bz#1993245
|
||||||
|
|
||||||
* Tue Aug 06 2024 Jan Grulich <jgrulich@redhat.com> - 0.28.3-1
|
* Wed Aug 18 2021 Jan Grulich <jgrulich@redhat.com> - 0.27.4-4
|
||||||
- 0.28.3
|
- Fix test for CVE-2021-29470
|
||||||
Resolves: RHEL-45267
|
Resolves: bz#1993245
|
||||||
|
|
||||||
* Mon Jun 24 2024 Troy Dawson <tdawson@redhat.com> - 0.27.6-8
|
* Wed Aug 18 2021 Jan Grulich <jgrulich@redhat.com> - 0.27.4-3
|
||||||
- Bump release for June 2024 mass rebuild
|
- Fix out-of-bounds read in Exiv2::Jp2Image::printStructure
|
||||||
|
Resolves: bz#1993282
|
||||||
|
|
||||||
* Wed Jan 24 2024 Fedora Release Engineering <releng@fedoraproject.org> - 0.27.6-7
|
- Fix out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header
|
||||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
|
Resolves: bz#1993245
|
||||||
|
|
||||||
* Fri Jan 19 2024 Fedora Release Engineering <releng@fedoraproject.org> - 0.27.6-6
|
* Thu Aug 05 2021 Jan Grulich <jgrulich@redhat.com> - 0.27.4-2
|
||||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
|
- Do not duplicate changelog file
|
||||||
|
Resolves: bz#1989860
|
||||||
|
|
||||||
* Wed Jul 19 2023 Fedora Release Engineering <releng@fedoraproject.org> - 0.27.6-5
|
* Wed Aug 04 2021 Jan Grulich <jgrulich@redhat.com> - 0.27.4-1
|
||||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild
|
- 0.27.4
|
||||||
|
Resolves: bz#1989860
|
||||||
* Tue Jan 31 2023 Jan Grulich <jgrulich@redhat.com> - 0.27.6-1
|
|
||||||
- 0.27.6
|
|
||||||
- migrated to SPDX license
|
|
||||||
|
|
||||||
* Thu Jan 19 2023 Fedora Release Engineering <releng@fedoraproject.org> - 0.27.5-4
|
|
||||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
|
|
||||||
|
|
||||||
* Thu Jul 21 2022 Fedora Release Engineering <releng@fedoraproject.org> - 0.27.5-3
|
|
||||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
|
|
||||||
|
|
||||||
* Thu Jan 20 2022 Fedora Release Engineering <releng@fedoraproject.org> - 0.27.5-2
|
|
||||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
|
|
||||||
|
|
||||||
* Wed Oct 27 2021 Rex Dieter <rdieter@fedoraproject.org> - 0.27.5-1
|
|
||||||
- 0.27.5 (final)
|
|
||||||
|
|
||||||
* Mon Oct 04 2021 Rex Dieter <rdieter@fedoraproject.org> - 0.27.5-0.3.RC3
|
|
||||||
- 0.27-5-RC3
|
|
||||||
|
|
||||||
* Fri Sep 10 2021 Rex Dieter <rdieter@fedoraproject.org> - 0.27.5-0.2.RC2
|
|
||||||
- 0.27.5-RC2 (#2003208)
|
|
||||||
|
|
||||||
* Wed Aug 11 2021 Rex Dieter <rdieter@fedoraproject.org> - 0.27.5-0.1.RC1
|
|
||||||
- 0.27.5-RC1 (#1992344)
|
|
||||||
|
|
||||||
* Wed Jul 21 2021 Fedora Release Engineering <releng@fedoraproject.org> - 0.27.4-2
|
|
||||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
|
|
||||||
|
|
||||||
* Fri Jun 18 2021 Rex Dieter <rdieter@fedoraproject.org> - 0.27.4-1
|
|
||||||
- 0.27.4 (#1941230)
|
|
||||||
|
|
||||||
* Tue May 25 2021 Jan Grulich <jgrulich@redhat.com> - 0.27.3-6
|
* Tue May 25 2021 Jan Grulich <jgrulich@redhat.com> - 0.27.3-6
|
||||||
- CVE-2021-29623 exiv2: a read of uninitialized memory may lead to information leak
|
- CVE-2021-29623 exiv2: a read of uninitialized memory may lead to information leak
|
||||||
CVE-2021-32617 exiv2: DoS due to quadratic complexity in ProcessUTF8Portion
|
Resolves: bz#1964182
|
||||||
|
|
||||||
* Thu Apr 29 2021 Jan Grulich <jgrulich@redhat.com> - 0.27.3-6
|
- CVE-2021-32617 exiv2: DoS due to quadratic complexity in ProcessUTF8Portion
|
||||||
|
Resolves: bz#1964188
|
||||||
|
|
||||||
|
* Thu Apr 29 2021 Jan Grulich <jgrulich@redhat.com> - 0.27.3-5
|
||||||
|
- CVE-2021-29473 exiv2: out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata
|
||||||
|
Resolves: bz#1954065
|
||||||
|
|
||||||
|
- CVE-2021-29470 exiv2: out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header
|
||||||
|
Resolves: bz#1955014
|
||||||
|
|
||||||
|
* Wed Apr 28 2021 Jan Grulich <jgrulich@redhat.com> - 0.27.3-4
|
||||||
|
- CVE-2021-29458 exiv2: out-of-bounds read in Exiv2::Internal::CrwMap::encode
|
||||||
|
Resolves: bz#1953758
|
||||||
|
|
||||||
|
- CVE-2021-29457 exiv2: heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata
|
||||||
|
Resolves: bz#1953772
|
||||||
|
|
||||||
|
* Wed Apr 14 2021 Jan Grulich <jgrulich@redhat.com> - 0.27.3-3
|
||||||
- CVE-2021-3482: Fix heap-based buffer overflow in Jp2Image::readMetadata()
|
- CVE-2021-3482: Fix heap-based buffer overflow in Jp2Image::readMetadata()
|
||||||
CVE-2021-29458 exiv2: out-of-bounds read in Exiv2::Internal::CrwMap::encode
|
Resolves: bz#1947160
|
||||||
CVE-2021-29457 exiv2: heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata
|
|
||||||
CVE-2021-29470 exiv2: out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header
|
|
||||||
CVE-2021-29473 exiv2: out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata
|
|
||||||
|
|
||||||
* Tue Jan 26 2021 Fedora Release Engineering <releng@fedoraproject.org> - 0.27.3-5
|
* Wed Oct 7 2020 Jan Grulich <jgrulich@redhat.com> - 0.27.3-2
|
||||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
|
- Avoid duplicating Changelog file
|
||||||
|
Resolves: bz#1880984
|
||||||
|
|
||||||
* Wed Aug 26 2020 Rex Dieter <rdieter@fedoraproject.org> - 0.27.3-4
|
* Wed Oct 7 2020 Jan Grulich <jgrulich@redhat.com> - 0.27.3-1
|
||||||
- support new cmake macro semantics
|
- Update to 0.27.3
|
||||||
|
Resolves: bz#1880984
|
||||||
|
|
||||||
* Sat Aug 01 2020 Fedora Release Engineering <releng@fedoraproject.org> - 0.27.3-3
|
* Wed Mar 04 2020 Jan Grulich <jgrulich@redhat.com> - 0.27.2-5
|
||||||
- Second attempt - Rebuilt for
|
- Fix failing test
|
||||||
https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
|
Resolves: bz#1800472
|
||||||
|
|
||||||
* Mon Jul 27 2020 Fedora Release Engineering <releng@fedoraproject.org> - 0.27.3-2
|
* Wed Mar 04 2020 Jan Grulich <jgrulich@redhat.com> - 0.27.2-4
|
||||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
|
- Drop test for the previous CVE as we test it manually and we don't have POC available
|
||||||
|
Resolves: bz#1800472
|
||||||
|
|
||||||
* Tue Jun 30 2020 Rex Dieter <rdieter@fedoraproject.org> - 0.27.3-1
|
* Wed Feb 26 2020 Jan Grulich <jgrulich@redhat.com> - 0.27.2-3
|
||||||
- 0.27.3
|
- Fix infinite loop and hang in Jp2Image::readMetadata()
|
||||||
|
Resolves: bz#1800472
|
||||||
|
|
||||||
* Tue Jan 28 2020 Fedora Release Engineering <releng@fedoraproject.org> - 0.27.2-2
|
* Tue Oct 29 2019 Jan Grulich <jgrulich@redhat.com> - 0.27.2-2
|
||||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
|
Rebuild
|
||||||
|
Resolves: bz#1651917
|
||||||
|
|
||||||
* Mon Jul 29 2019 Rex Dieter <rdieter@fedoraproject.org> - 0.27.2-1
|
* Fri Sep 20 2019 Jan Grulich <jgrulich@redhat.com> - 0.27.2-1
|
||||||
- 0.27.2
|
- Update to 0.27.2
|
||||||
|
Resolves: bz#1651917
|
||||||
|
|
||||||
* Thu Jul 25 2019 Fedora Release Engineering <releng@fedoraproject.org> - 0.27.2-0.2.RC2
|
* Tue Sep 11 2018 Jan Grulich <jgrulich@redhat.com> - 0.26-10
|
||||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
|
- Security fix for CVE-2018-16336
|
||||||
|
|
||||||
* Tue Jul 16 2019 Rex Dieter <rdieter@fedoraproject.org> - 0.27.2-0.1.RC2
|
* Tue Jul 24 2018 Jan Grulich <jgrulich@redhat.com> - 0.26-9
|
||||||
- 0.27.2-RC2 (#1720353)
|
|
||||||
|
|
||||||
* Fri Apr 26 2019 Rex Dieter <rdieter@fedoraproject.org> - 0.27.1-1
|
|
||||||
- exiv-0.27.1 (#1696117)
|
|
||||||
|
|
||||||
* Thu Jan 31 2019 Rex Dieter <rdieter@fedoraproject.org> - 0.27.0-3
|
|
||||||
- -devel: Requires: expat-devel
|
|
||||||
|
|
||||||
* Wed Jan 30 2019 Rex Dieter <rdieter@fedoraproject.org> - 0.27.0-2
|
|
||||||
- pull in upstream fix for pkgconfig exiv2.pc
|
|
||||||
|
|
||||||
* Thu Jan 10 2019 Rex Dieter <rdieter@fedoraproject.org> - 0.27.0-1
|
|
||||||
- exiv2-0.27.0 (#1665246)
|
|
||||||
|
|
||||||
* Thu Jan 10 2019 Rex Dieter <rdieter@fedoraproject.org> - 0.26-13
|
|
||||||
- backport pentax DNG crasher (#1585514, exiv2#201)
|
|
||||||
|
|
||||||
* Tue Jul 24 2018 Jan Grulich <jgrulich@redhat.com> - 0.26-12
|
|
||||||
- Security fix for CVE-2017-17723, CVE-2017-17725, CVE-2018-10958, CVE-2018-10998,
|
- Security fix for CVE-2017-17723, CVE-2017-17725, CVE-2018-10958, CVE-2018-10998,
|
||||||
CVE-2018-11531, CVE-2018-12264, CVE-2018-12265, CVE-2018-14046, CVE-2018-5772,
|
CVE-2018-11531, CVE-2018-12264, CVE-2018-12265, CVE-2018-14046, CVE-2018-5772,
|
||||||
CVE-2018-8976, CVE-2018-8977, CVE-2018-9144
|
CVE-2018-8976, CVE-2018-8977, CVE-2018-9144
|
||||||
|
|
||||||
* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> - 0.26-11
|
|
||||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
|
|
||||||
|
|
||||||
* Thu May 03 2018 Germano Massullo <germano.massullo@gmail.com> - 0.26-10
|
|
||||||
- added patches that fix CVE-2017-17723 CVE-2017-17725 CVE-2017-5772
|
|
||||||
- moved 0006-1296-Fix-submitted.patch file from sources to package tree
|
|
||||||
|
|
||||||
* Tue Feb 20 2018 Rex Dieter <rdieter@fedoraproject.org> - 0.26-9
|
|
||||||
- BR: gcc-c++
|
|
||||||
|
|
||||||
* Wed Feb 07 2018 Fedora Release Engineering <releng@fedoraproject.org> - 0.26-8
|
* Wed Feb 07 2018 Fedora Release Engineering <releng@fedoraproject.org> - 0.26-8
|
||||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
|
||||||
|
|
@ -1,68 +0,0 @@
|
|||||||
From 630487ffc5feda28aa62dc91eaeae8b0b7507851 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Kevin Backhouse <kevinbackhouse@github.com>
|
|
||||||
Date: Wed, 19 Feb 2025 16:21:06 +0000
|
|
||||||
Subject: [PATCH] Regression test for
|
|
||||||
https://github.com/Exiv2/exiv2/security/advisories/GHSA-38h4-fx85-qcx7
|
|
||||||
|
|
||||||
(cherry picked from commit 9f8e1a57b6c6853947360d1187bc24d72056c97a)
|
|
||||||
---
|
|
||||||
test/data/issue_ghsa_38h4_fx85_qcx7_poc.tiff | Bin 0 -> 603 bytes
|
|
||||||
.../github/test_issue_ghsa_38h4_fx85_qcx7.py | 22 ++++++++++++++++++
|
|
||||||
.../test_regression_allfiles.py | 1 +
|
|
||||||
tests/suite.conf | 1 +
|
|
||||||
4 files changed, 24 insertions(+)
|
|
||||||
create mode 100644 test/data/issue_ghsa_38h4_fx85_qcx7_poc.tiff
|
|
||||||
create mode 100644 tests/bugfixes/github/test_issue_ghsa_38h4_fx85_qcx7.py
|
|
||||||
|
|
||||||
diff --git a/tests/bugfixes/github/test_issue_ghsa_38h4_fx85_qcx7.py b/tests/bugfixes/github/test_issue_ghsa_38h4_fx85_qcx7.py
|
|
||||||
new file mode 100644
|
|
||||||
index 0000000000..07082caf62
|
|
||||||
--- /dev/null
|
|
||||||
+++ b/tests/bugfixes/github/test_issue_ghsa_38h4_fx85_qcx7.py
|
|
||||||
@@ -0,0 +1,22 @@
|
|
||||||
+# -*- coding: utf-8 -*-
|
|
||||||
+
|
|
||||||
+from system_tests import CaseMeta, path
|
|
||||||
+
|
|
||||||
+
|
|
||||||
+class TiffSubIfd_use_after_free(metaclass=CaseMeta):
|
|
||||||
+ """
|
|
||||||
+ Regression test for the bug described in:
|
|
||||||
+ https://github.com/Exiv2/exiv2/security/advisories/GHSA-38h4-fx85-qcx7
|
|
||||||
+ """
|
|
||||||
+
|
|
||||||
+ url = "https://github.com/Exiv2/exiv2/security/advisories/GHSA-38h4-fx85-qcx7"
|
|
||||||
+
|
|
||||||
+ filename = path("$data_path/issue_ghsa_38h4_fx85_qcx7_poc.tiff")
|
|
||||||
+ commands = ["$exiv2 -q fi $filename"]
|
|
||||||
+ stdout = [""]
|
|
||||||
+ stderr = [
|
|
||||||
+ """Exiv2 exception in fixiso action for file $filename:
|
|
||||||
+$kerImageWriteFailed
|
|
||||||
+"""
|
|
||||||
+ ]
|
|
||||||
+ retval = [1]
|
|
||||||
diff --git a/tests/regression_tests/test_regression_allfiles.py b/tests/regression_tests/test_regression_allfiles.py
|
|
||||||
index eb7f7cef2d..53e8de44ae 100644
|
|
||||||
--- a/tests/regression_tests/test_regression_allfiles.py
|
|
||||||
+++ b/tests/regression_tests/test_regression_allfiles.py
|
|
||||||
@@ -120,6 +120,7 @@ def get_valid_files(data_dir):
|
|
||||||
"issue_ghsa_mxw9_qx4c_6m8v_poc.jp2",
|
|
||||||
"issue_ghsa_hrw9_ggg3_3r4r_poc.jpg",
|
|
||||||
"issue_ghsa_g9xm_7538_mq8w_poc.mov",
|
|
||||||
+ "issue_ghsa_38h4_fx85_qcx7_poc.tiff",
|
|
||||||
"pocIssue283.jpg",
|
|
||||||
"poc_1522.jp2",
|
|
||||||
"xmpsdk.xmp",
|
|
||||||
diff --git a/tests/suite.conf b/tests/suite.conf
|
|
||||||
index c2bf1741e8..249a97fa93 100644
|
|
||||||
--- a/tests/suite.conf
|
|
||||||
+++ b/tests/suite.conf
|
|
||||||
@@ -41,6 +41,7 @@ jpegparsetest: ${ENV:exiv2_path}/jpegparsetest
|
|
||||||
kerOffsetOutOfRange: Offset out of range
|
|
||||||
kerFailedToReadImageData: Failed to read image data
|
|
||||||
kerInputDataReadFailed: Failed to read input data
|
|
||||||
+kerImageWriteFailed: Failed to write image
|
|
||||||
kerCorruptedMetadata: corrupted image metadata
|
|
||||||
kerInvalidMalloc: invalid memory allocation request
|
|
||||||
kerInvalidTypeValue: invalid type in tiff structure
|
|
@ -1,79 +0,0 @@
|
|||||||
From facce628f3622764e91a8161f89ade8cb34bc120 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Rosen Penev <rosenp@gmail.com>
|
|
||||||
Date: Mon, 17 Feb 2025 16:34:40 -0800
|
|
||||||
Subject: [PATCH] Revert "fix copy constructors"
|
|
||||||
|
|
||||||
This reverts commit afb2d998fe62f7e829e93e62506bf9968117c9c5.
|
|
||||||
|
|
||||||
This commit is wrong and ends up resulting in use after frees because of
|
|
||||||
C pointers. The proper solution is shared_ptr instead of C pointers but
|
|
||||||
that's a lot more involved than reverting this.
|
|
||||||
|
|
||||||
Signed-off-by: Rosen Penev <rosenp@gmail.com>
|
|
||||||
(cherry picked from commit ebff8b48820b96c786cfddbf0bebb395cb1317d7)
|
|
||||||
---
|
|
||||||
src/tiffcomposite_int.cpp | 19 +++++++++++++++++++
|
|
||||||
src/tiffcomposite_int.hpp | 6 +++---
|
|
||||||
2 files changed, 22 insertions(+), 3 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/src/tiffcomposite_int.cpp b/src/tiffcomposite_int.cpp
|
|
||||||
index 95ce450c7d..3e6e93d5c5 100644
|
|
||||||
--- a/src/tiffcomposite_int.cpp
|
|
||||||
+++ b/src/tiffcomposite_int.cpp
|
|
||||||
@@ -127,6 +127,25 @@ TiffEntryBase::TiffEntryBase(const TiffEntryBase& rhs) :
|
|
||||||
storage_(rhs.storage_) {
|
|
||||||
}
|
|
||||||
|
|
||||||
+TiffDirectory::TiffDirectory(const TiffDirectory& rhs) : TiffComponent(rhs), hasNext_(rhs.hasNext_) {
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+TiffSubIfd::TiffSubIfd(const TiffSubIfd& rhs) : TiffEntryBase(rhs), newGroup_(rhs.newGroup_) {
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+TiffBinaryArray::TiffBinaryArray(const TiffBinaryArray& rhs) :
|
|
||||||
+ TiffEntryBase(rhs),
|
|
||||||
+ cfgSelFct_(rhs.cfgSelFct_),
|
|
||||||
+ arraySet_(rhs.arraySet_),
|
|
||||||
+ arrayCfg_(rhs.arrayCfg_),
|
|
||||||
+ arrayDef_(rhs.arrayDef_),
|
|
||||||
+ defSize_(rhs.defSize_),
|
|
||||||
+ setSize_(rhs.setSize_),
|
|
||||||
+ origData_(rhs.origData_),
|
|
||||||
+ origSize_(rhs.origSize_),
|
|
||||||
+ pRoot_(rhs.pRoot_) {
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
TiffComponent::UniquePtr TiffComponent::clone() const {
|
|
||||||
return UniquePtr(doClone());
|
|
||||||
}
|
|
||||||
diff --git a/src/tiffcomposite_int.hpp b/src/tiffcomposite_int.hpp
|
|
||||||
index 4506a4dca0..307e0bd9e3 100644
|
|
||||||
--- a/src/tiffcomposite_int.hpp
|
|
||||||
+++ b/src/tiffcomposite_int.hpp
|
|
||||||
@@ -851,7 +851,7 @@ class TiffDirectory : public TiffComponent {
|
|
||||||
//! @name Protected Creators
|
|
||||||
//@{
|
|
||||||
//! Copy constructor (used to implement clone()).
|
|
||||||
- TiffDirectory(const TiffDirectory&) = default;
|
|
||||||
+ TiffDirectory(const TiffDirectory& rhs);
|
|
||||||
//@}
|
|
||||||
|
|
||||||
//! @name Protected Manipulators
|
|
||||||
@@ -944,7 +944,7 @@ class TiffSubIfd : public TiffEntryBase {
|
|
||||||
//! @name Protected Creators
|
|
||||||
//@{
|
|
||||||
//! Copy constructor (used to implement clone()).
|
|
||||||
- TiffSubIfd(const TiffSubIfd&) = default;
|
|
||||||
+ TiffSubIfd(const TiffSubIfd& rhs);
|
|
||||||
TiffSubIfd& operator=(const TiffSubIfd&) = delete;
|
|
||||||
//@}
|
|
||||||
|
|
||||||
@@ -1346,7 +1346,7 @@ class TiffBinaryArray : public TiffEntryBase {
|
|
||||||
//! @name Protected Creators
|
|
||||||
//@{
|
|
||||||
//! Copy constructor (used to implement clone()).
|
|
||||||
- TiffBinaryArray(const TiffBinaryArray&) = default;
|
|
||||||
+ TiffBinaryArray(const TiffBinaryArray& rhs);
|
|
||||||
//@}
|
|
||||||
|
|
||||||
//! @name Protected Manipulators
|
|
@ -1,6 +0,0 @@
|
|||||||
--- !Policy
|
|
||||||
product_versions:
|
|
||||||
- rhel-10
|
|
||||||
decision_context: osci_compose_gate
|
|
||||||
rules:
|
|
||||||
- !PassingTestCaseRule {test_case_name: desktop-qe.desktop-ci.tier1-gating.functional}
|
|
2
sources
2
sources
@ -1,2 +0,0 @@
|
|||||||
SHA512 (exiv2-0.28.3.tar.gz) = c8338a118feefa104d73932890c732247c884ab9ce1d170c43a22ab5884517a0e2a7fd1febde7705b8290fbbbc29e64738610404816e4db2b56a70fc444ca049
|
|
||||||
SHA512 (issue_ghsa_38h4_fx85_qcx7_poc.tiff) = adaa541625873c88d58a5563e3d345f51252bc83ba487f004e54cd327b48fb2258e5d5cf27547f1da426d2b2a9a21d1f7d6378c877ac073477658fc4b300e5b9
|
|
Loading…
Reference in New Issue
Block a user