Compare commits

...

10 Commits

Author SHA1 Message Date
openeuler-ci-bot
3a6c9716e6
!85 [sync] PR-83: Fix CVE-2025-26623
From: @openeuler-sync-bot 
Reviewed-by: @lyn1001 
Signed-off-by: @lyn1001
2025-02-24 06:25:59 +00:00
wk333
3d62e894e3 Fix CVE-2025-26623
(cherry picked from commit 1b97e609a53f6ea3828d361323c64b99a77bfff3)
2025-02-24 10:33:38 +08:00
openeuler-ci-bot
1ad8667c42
!78 Fix CVE-2024-39695
From: @starlet-dx 
Reviewed-by: @lyn1001 
Signed-off-by: @lyn1001
2024-07-09 06:12:48 +00:00
starlet-dx
6f33e1c8ac Fix CVE-2024-39695 2024-07-09 10:19:32 +08:00
openeuler-ci-bot
eba09ba26a
!77 Upgrade to 0.28.2 for fix CVE-2024-25112 and CVE-2024-24826
From: @starlet-dx 
Reviewed-by: @lyn1001 
Signed-off-by: @lyn1001
2024-02-18 01:27:55 +00:00
starlet-dx
ad2894d1f5 Upgrade to 0.28.2 for fix CVE-2024-25112 and CVE-2024-24826 2024-02-17 17:34:17 +08:00
openeuler-ci-bot
a32e67625e
!76 Upgrade to 0.28.1 for fix CVE-2023-44398
From: @starlet-dx 
Reviewed-by: @lyn1001 
Signed-off-by: @lyn1001
2023-11-09 06:53:17 +00:00
starlet-dx
62cc165d9f Upgrade to 0.28.1 for fix CVE-2023-44398 2023-11-09 11:27:00 +08:00
openeuler-ci-bot
16959e42b3
!74 Upgrade to version 0.28.0
From: @wu-leilei 
Reviewed-by: @lyn1001 
Signed-off-by: @lyn1001
2023-09-02 09:59:02 +00:00
lyn1001
8c90ffa2b8 Upgrade to version 0.28.0 2023-09-02 11:39:44 +08:00
6 changed files with 161 additions and 72 deletions

View File

@ -1,28 +0,0 @@
From 789ec5408f885709eef0a820416658b6e3882c0c Mon Sep 17 00:00:00 2001
From: qz_cx <wangqingzheng@kylinos.cn>
Date: Mon, 31 Oct 2022 15:13:45 +0800
Subject: [PATCH] Credit to
OSS-Fuzz:https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=52382
Avoid null pointer deref #2384
Merged
kevinbackhouse merged 2 commits into Exiv2
---
src/quicktimevideo.cpp | 1 +
1 file changed, 1 insertion(+)
diff --git a/src/quicktimevideo.cpp b/src/quicktimevideo.cpp
index 335d884..ef1a6e5 100644
--- a/src/quicktimevideo.cpp
+++ b/src/quicktimevideo.cpp
@@ -915,6 +915,7 @@ namespace Exiv2 {
}
else if(equalsQTimeTag(buf, "CMbo") || equalsQTimeTag(buf, "Cmbo")) {
+ enforce(tv, Exiv2::ErrorCode::kerCorruptedMetadata);
io_->read(buf.pData_, 2);
buf.pData_[2] = '\0' ;
tv_internal = find(cameraByteOrderTags, Exiv2::toString( buf.pData_));
--
2.33.0

View File

@ -1,30 +0,0 @@
From be374cc6cd51906eaacc7a4f77c9ac37ea7c69c7 Mon Sep 17 00:00:00 2001
From: qz_cx <wangqingzheng@kylinos.cn>
Date: Mon, 31 Oct 2022 14:29:31 +0800
Subject: [PATCH] Avoid potential integer overflow.
Merge pull request #2347 from kevinbackhouse/quicktimevideo-size-calc
Avoid potential integer overflow in QuickTimeVideo::userDataDecoder
@kevinbackhouse
kevinbackhouse committed on 7 Sep
---
src/quicktimevideo.cpp | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/quicktimevideo.cpp b/src/quicktimevideo.cpp
index 335d884..9b80947 100644
--- a/src/quicktimevideo.cpp
+++ b/src/quicktimevideo.cpp
@@ -895,7 +895,7 @@ namespace Exiv2 {
tv = find(userDataReferencetags, Exiv2::toString( buf.pData_));
- if(size == 0 || (size - 12) <= 0)
+ if (size <= 12)
break;
else if(equalsQTimeTag(buf, "DcMD") || equalsQTimeTag(buf, "NCDT"))
--
2.33.0

80
CVE-2025-26623.patch Normal file
View File

@ -0,0 +1,80 @@
From ebff8b48820b96c786cfddbf0bebb395cb1317d7 Mon Sep 17 00:00:00 2001
From: Rosen Penev <rosenp@gmail.com>
Date: Mon, 17 Feb 2025 16:34:40 -0800
Subject: [PATCH] Revert "fix copy constructors"
Origin: https://github.com/Exiv2/exiv2/commit/ebff8b48820b96c786cfddbf0bebb395cb1317d7
This reverts commit afb2d998fe62f7e829e93e62506bf9968117c9c5.
This commit is wrong and ends up resulting in use after frees because of
C pointers. The proper solution is shared_ptr instead of C pointers but
that's a lot more involved than reverting this.
Signed-off-by: Rosen Penev <rosenp@gmail.com>
---
src/tiffcomposite_int.cpp | 19 +++++++++++++++++++
src/tiffcomposite_int.hpp | 6 +++---
2 files changed, 22 insertions(+), 3 deletions(-)
diff --git a/src/tiffcomposite_int.cpp b/src/tiffcomposite_int.cpp
index 07c9a6c843..f4bb5037bd 100644
--- a/src/tiffcomposite_int.cpp
+++ b/src/tiffcomposite_int.cpp
@@ -124,6 +124,25 @@ TiffEntryBase::TiffEntryBase(const TiffEntryBase& rhs) :
storage_(rhs.storage_) {
}
+TiffDirectory::TiffDirectory(const TiffDirectory& rhs) : TiffComponent(rhs), hasNext_(rhs.hasNext_) {
+}
+
+TiffSubIfd::TiffSubIfd(const TiffSubIfd& rhs) : TiffEntryBase(rhs), newGroup_(rhs.newGroup_) {
+}
+
+TiffBinaryArray::TiffBinaryArray(const TiffBinaryArray& rhs) :
+ TiffEntryBase(rhs),
+ cfgSelFct_(rhs.cfgSelFct_),
+ arraySet_(rhs.arraySet_),
+ arrayCfg_(rhs.arrayCfg_),
+ arrayDef_(rhs.arrayDef_),
+ defSize_(rhs.defSize_),
+ setSize_(rhs.setSize_),
+ origData_(rhs.origData_),
+ origSize_(rhs.origSize_),
+ pRoot_(rhs.pRoot_) {
+}
+
TiffComponent::UniquePtr TiffComponent::clone() const {
return UniquePtr(doClone());
}
diff --git a/src/tiffcomposite_int.hpp b/src/tiffcomposite_int.hpp
index 0e28aba912..01d5109a59 100644
--- a/src/tiffcomposite_int.hpp
+++ b/src/tiffcomposite_int.hpp
@@ -851,7 +851,7 @@ class TiffDirectory : public TiffComponent {
//! @name Protected Creators
//@{
//! Copy constructor (used to implement clone()).
- TiffDirectory(const TiffDirectory&) = default;
+ TiffDirectory(const TiffDirectory& rhs);
//@}
//! @name Protected Manipulators
@@ -944,7 +944,7 @@ class TiffSubIfd : public TiffEntryBase {
//! @name Protected Creators
//@{
//! Copy constructor (used to implement clone()).
- TiffSubIfd(const TiffSubIfd&) = default;
+ TiffSubIfd(const TiffSubIfd& rhs);
TiffSubIfd& operator=(const TiffSubIfd&) = delete;
//@}
@@ -1334,7 +1334,7 @@ class TiffBinaryArray : public TiffEntryBase {
//! @name Protected Creators
//@{
//! Copy constructor (used to implement clone()).
- TiffBinaryArray(const TiffBinaryArray&) = default;
+ TiffBinaryArray(const TiffBinaryArray& rhs);
//@}
//! @name Protected Manipulators

View File

@ -0,0 +1,54 @@
From 3a28346db5ae1735a8728fe3491b0aecc1dbf387 Mon Sep 17 00:00:00 2001
From: Kevin Backhouse <kevinbackhouse@github.com>
Date: Thu, 4 Jul 2024 00:04:32 +0100
Subject: [PATCH] Credit to OSS-Fuzz:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=68210 Use readOrThrow()
to detect premature EOF.
(cherry picked from commit fc1fe453a246cb8e188bbc226b48b339d5f81580)
---
src/asfvideo.cpp | 10 ++++++----
1 file changed, 6 insertions(+), 4 deletions(-)
diff --git a/src/asfvideo.cpp b/src/asfvideo.cpp
index ab1ad4a591..1cec3854c9 100644
--- a/src/asfvideo.cpp
+++ b/src/asfvideo.cpp
@@ -238,7 +238,7 @@ void AsfVideo::readMetadata() {
AsfVideo::HeaderReader::HeaderReader(const BasicIo::UniquePtr& io) : IdBuf_(GUID) {
if (io->size() >= io->tell() + GUID + QWORD) {
- IdBuf_ = io->read(GUID);
+ io->readOrThrow(IdBuf_.data(), IdBuf_.size(), Exiv2::ErrorCode::kerCorruptedMetadata);
size_ = readQWORDTag(io);
if (size_ >= GUID + QWORD)
@@ -296,7 +296,7 @@ void AsfVideo::decodeBlock() {
void AsfVideo::decodeHeader() {
DataBuf nbHeadersBuf(DWORD + 1);
- io_->read(nbHeadersBuf.data(), DWORD);
+ io_->readOrThrow(nbHeadersBuf.data(), DWORD, Exiv2::ErrorCode::kerCorruptedMetadata);
uint32_t nb_headers = Exiv2::getULong(nbHeadersBuf.data(), littleEndian);
Internal::enforce(nb_headers < std::numeric_limits<uint32_t>::max(), Exiv2::ErrorCode::kerCorruptedMetadata);
@@ -358,7 +358,8 @@ void AsfVideo::DegradableJPEGMedia() {
}
void AsfVideo::streamProperties() {
- DataBuf streamTypedBuf = io_->read(GUID);
+ DataBuf streamTypedBuf(GUID);
+ io_->readOrThrow(streamTypedBuf.data(), streamTypedBuf.size(), Exiv2::ErrorCode::kerCorruptedMetadata);
enum class streamTypeInfo { Audio = 1, Video = 2 };
auto stream = static_cast<streamTypeInfo>(0);
@@ -476,7 +477,8 @@ void AsfVideo::contentDescription() {
} // AsfVideo::extendedContentDescription
void AsfVideo::fileProperties() {
- DataBuf FileIddBuf = io_->read(GUID);
+ DataBuf FileIddBuf(GUID);
+ io_->readOrThrow(FileIddBuf.data(), FileIddBuf.size(), Exiv2::ErrorCode::kerCorruptedMetadata);
xmpData()["Xmp.video.FileID"] = GUIDTag(FileIddBuf.data()).to_string();
xmpData()["Xmp.video.FileLength"] = readQWORDTag(io_);
xmpData()["Xmp.video.CreationDate"] = readQWORDTag(io_);

View File

@ -1,18 +1,19 @@
Name: exiv2
Version: 0.27.5
Release: 4
Version: 0.28.2
Release: 3
Summary: Exif, IPTC and XMP metadata and the ICC Profile
License: GPLv2+
URL: http://www.exiv2.org/
Source0: https://github.com/Exiv2/exiv2/archive/refs/tags/v%{version}.tar.gz
Patch0001: CVE-2022-3755.patch
Patch0002: CVE-2022-3756.patch
Source0: https://github.com/Exiv2/exiv2/archive/v%{version}/%{name}-%{version}.tar.gz
# https://github.com/Exiv2/exiv2/commit/3a28346db5ae1735a8728fe3491b0aecc1dbf387
Patch3000: backport-CVE-2024-39695.patch
Patch3001: CVE-2025-26623.patch
Provides: exiv2-libs
Obsoletes: exiv2-libs
Provides: exiv2-libs = %{version}-%{release}
Obsoletes: exiv2-libs < %{version}-%{release}
BuildRequires: cmake expat-devel gcc-c++ gettext pkgconfig
BuildRequires: doxygen graphviz libxslt zlib-devel chrpath
BuildRequires: cmake expat-devel gcc-c++ gettext pkgconfig brotli-devel
BuildRequires: doxygen graphviz libxslt zlib-devel chrpath inih-devel
%description
Exiv2 is a Cross-platform C++ library and a command line utility to manage image metadata.
@ -45,7 +46,7 @@ make doc
%install
%make_install
%find_lang exiv2 --with-man
chrpath -d %{buildroot}%{_libdir}/libexiv2.so.0.27.5
chrpath -d %{buildroot}%{_libdir}/libexiv2.so.0.28.2
chrpath -d %{buildroot}%{_bindir}/%{name}
@ -60,10 +61,8 @@ test -x %{buildroot}%{_libdir}/libexiv2.so
%doc doc/ChangeLog
%license COPYING
%{_bindir}/exiv2
%{_libdir}/libexiv2.so.27*
%{_libdir}/libexiv2.so.28*
%{_libdir}/libexiv2.so.%{version}
%exclude %{_libdir}/pkgconfig/exiv2.lsm
%exclude %{_libdir}/libxmp.a
%files devel
%defattr(-,root,root)
@ -71,7 +70,6 @@ test -x %{buildroot}%{_libdir}/libexiv2.so
%{_libdir}/libexiv2.so
%{_includedir}/exiv2/
%{_libdir}/cmake/exiv2/
%{_libdir}/libexiv2-xmp.a
%files help
%defattr(-,root,root)
@ -79,6 +77,21 @@ test -x %{buildroot}%{_libdir}/libexiv2.so
%{_pkgdocdir}/
%changelog
* Mon Feb 24 2025 wangkai <13474090681@163.com> - 0.28.2-3
- Fix CVE-2025-26623
* Tue Jul 09 2024 yaoxin <yao_xin001@hoperun.com> - 0.28.2-2
- Fix CVE-2024-39695
* Sat Feb 17 2024 yaoxin <yao_xin001@hoperun.com> - 0.28.2-1
- Upgrade to 0.28.2 for fix CVE-2024-25112 and CVE-2024-24826
* Thu Nov 09 2023 yaoxin <yao_xin001@hoperun.com> - 0.28.1-1
- Upgrade to 0.28.1 for fix CVE-2023-44398
* Sat Sep 2 2023 liyanan <thistleslyn@163.com> - 0.28.0-1
- Upgrade to version 0.28.0
* Thu Mar 2 2023 liyanan <liyanan32@h-partners.com> - 0.27.5-4
- Remove rpath