Change logs for exiv2 source package in Hirsute

  • exiv2 (0.27.3-3ubuntu1.6) hirsute-security; urgency=medium
    
      * SECURITY REGRESSION: out of range access that may cause a crash
        - debian/patches/CVE-2021-37620-4.patch: fix out of range access that may
          cause a crash (LP: #1941752)
        - debian/patches/CVE-2021-37620-5.patch: backport to C++98 (a str.pop_back
          that was added in C++11)
        - Thanks Simon Schmeißer
    
     -- Leonidas Da Silva Barbosa <email address hidden>  Mon, 10 Jan 2022 10:22:10 -0300
  • exiv2 (0.27.3-3ubuntu1.5) hirsute-security; urgency=medium
    
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2021-32815-*.patch: adds a check of sizes, adds
          regression test, adds msgs prints for DEBUG flags in
          src/crwimage_int.cpp.
        - CVE-2021-32815
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2021-34334-*.patch: adds regression test, adds
          an extra checking to prevent the loop counter from wrapping around in
          crwimage_int.cpp; adds defensive code to avoid integer overflow in loop
          conditions in src/actions.cpp, src/basicio.cpp, src/convert.cpp,
          src/exif.cpp, src/exvi2.cpp, src/iptc.cpp, src/preview.cpp,
          src/tags_int.cpp, src/tiffcomposite_int.cpp, src/types.cpp,
          src/xmp.cpp, src/xmpsidecar.cpp; adds a better fix for a potential
          integer overflow in bytes.size() in src/iptc.cpp; changes type of
          escapeStart to size_t in src/exiv2.cpp; fix warning comparison of
          integer expressions of different signedness in src/iptc.cpp,
          src/tags_int.cpp.
        - CVE-2021-34334
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2021-34335-*.patch: adds regression test;
          prevent divide-by-zero crash in src/minoltamn_int.cpp; adds defensive
          code in include/exiv2/value.hpp, src/tags_int.cpp.
        - CVE-2021-34335
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2021-37615-37616-*.patch: adds regression test;
          throw exception if lens info wasn't found in src/pentaxmn_int.cpp;
          adds a check to findKey din't return end() in src/convert.cpp,
          src/crwimage_int.cpp, src/exif.cpp, src/iptc.cpp, src/xmp.cpp.
        - CVE-2021-37615
        - CVE-2021-37616
      * SECURITY UPDATE: Out-of-bounds read
        - debian/patches/CVE-2021-37618-*.patch: adds regression test; adds
          a better bounds checking for Jp2Image::printStructure in
          src/jp2image.cpp.
        - CVE-2021-37618
      * SECURITY UPDATE: Out-of-bounds read
        - debian/patches/CVE-2021-37619-*.patch: adds regression test;
          fix incorrect loop condition in src/jp2image.cpp.
        - CVE-2021-37619
      * SECURITY UPDATE: Out-of-bounds read
        - debian/patches/CVE-2021-37620-*.patch: adds regression test;
          check that type ins't an empty string in src/values.cpp and
          adds safer vector indexing in multiples files in src/*.
        - CVE-2021-37620
      * SECURITY UPDATE: Infinite loop
        - debian/patches/CVE-2021-37621-*.patch: adds regression test;
          checks dirlength to avoid infinite loop and adds some defensive code in
          src/image.cpp.
        - CVE-2021-37621
      * SECURITY UPDATE: Infinite loop
        - debian/patches/CVE-2021-37622-*.patch: adds regression test; makes sure
          that read is complete to prevent infinite loop and remove dedundant
          check in src/jpgimage.cpp.
        - CVE-2021-37622
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2021-37623-1.patch: adds regression test.
        - debian/patches/CVE-2021-37623-2.patch: adjusts bufRead after seek() in
          src/jpgimage.cpp.
        - debian/patches/CVE-2021-37623-3.patch: improves handling of jpg segments
          to avoid out-of-bound in src/jpgimage.cpp, test/data/icc-test.out,
          tests/bugfixes/redmine/test_issue_1247.py.
        - debian/patches/CVE-2021-37623-4.patch: fix a compiler warning in
          src/jpgimage.cpp.
        - debian/patches/CVE-2021-37623-5.patch: updates src/jpgimage.cpp.
        - debian/patches/CVE-2021-37623-6.patch: fix poc tests.
        - debian/patches/CVE-2021-37623-7.patch: Adds comments to explain
          bounds-check in src/jpgimage.cpp.
        - CVE-2021-37623
    
     -- Leonidas Da Silva Barbosa <email address hidden>  Thu, 12 Aug 2021 10:18:53 -0300
  • exiv2 (0.27.3-3ubuntu1.4) hirsute-security; urgency=medium
    
      * SECURITY UPDATE: Buffer Overflow
        - debian/patches/CVE-2021-31291.patch: fix out of buffer checking limit
          and throw exception in case box is broken in src/jp2image.cpp.
        - CVE-2021-31291
    
     -- Leonidas Da Silva Barbosa <email address hidden>  Wed, 28 Jul 2021 12:13:39 -0300
  • exiv2 (0.27.3-3ubuntu1.3) hirsute-security; urgency=medium
    
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2021-29463.patch: Improve bound checking in
          WebPImage::doWriteMetadata() in src/webpimage.cpp.
        - CVE-2021-29463
      * SECURITY UPDATE: Heap buffer overflow
        - debian/patches/CVE-2021-29464.patch: better bounds checking in
          Jp2Image::encodeJp2Header() in src/jp2image.cpp.
        - CVE-2021-29464
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2021-29473.patch: Add bounds check in
          Jp2Image::doWriteMetadata() in src/jp2image.cpp.
        - CVE-2021-29473
      * SECURITY UPDATE: Leak bytes of stack memory
        - debian/patches/CVE-2021-29623.patch: Use readOrThrow to check error
          conditions of iIo.read() src/webpimage.cpp.
        - CVE-2021-29623
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2021-32617.patch: Fix quadratic complexity performance bug
          in xmpsdk/src/XMPMeta-Parse.cpp.
        - CVE-2021-32617
    
     -- Leonidas Da Silva Barbosa <email address hidden>  Mon, 24 May 2021 09:59:46 -0300
  • exiv2 (0.27.3-3ubuntu1.1) hirsute-security; urgency=medium
    
      * SECURITY UPDATE: Heap buffer overflow
        - debian/patches/CVE-2021-3482-*.patch: fix buffer overflow
          in src/jp2image.cpp and adds tests test/data/poc_1522.jp2,
          tests/bugfixes/github/test_issue_1522.py.
        - debian/source/include-binaries: add poc_1522.jp2 entry.
        - CVE-2021-3482
      * SECURITY UPDATE: An out of buffer access
        - debian/patches/CVE-2021-29457.patch: fix in src/jp2image.cpp
          (LP: #1923479)
        - CVE-2021-29457
      * SECURITY UPDATE: Integer overflow
        - debian/patches/CVE-2021-29458.patch: fix in src/crwimage_int.cpp
          (LP: #1923479)
        - CVE-2021-29458
      * SECURITY UPDATE: Out-of-bounds
        - debian/patches/CVE-2021-29470-*.patch: Add more bound checks in
          Jp2Image::encodeJp2Header and add some tests from/for github.
        - CVE-2021-29470
    
     -- Leonidas Da Silva Barbosa <email address hidden>  Mon, 12 Apr 2021 14:47:29 -0300
  • exiv2 (0.27.3-3ubuntu1) hirsute; urgency=medium
    
      * Mark symbols as optional not seen when building with lto.
    
     -- Matthias Klose <email address hidden>  Mon, 22 Mar 2021 20:18:15 +0100
  • exiv2 (0.27.3-3) unstable; urgency=medium
    
      * Team upload.
      * Update symbols file from the logs of buildds.
    
     -- Pino Toscano <email address hidden>  Sun, 09 Aug 2020 07:15:23 +0200