Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libexif12-0.6.22-lp152.1.1 RPM for armv7hl

From OpenSuSE Ports Leap 15.2 for armv7hl

Name: libexif12 Distribution: openSUSE Leap 15.2
Version: 0.6.22 Vendor: openSUSE
Release: lp152.1.1 Build date: Wed Jun 10 16:54:31 2020
Group: System/Libraries Build host: obs-arm-6
Size: 2200716 Source RPM: libexif-0.6.22-lp152.1.1.src.rpm
Summary: An EXIF Tag Parsing Library for Digital Cameras
This library is used to parse EXIF information from JPEGs created by
digital cameras.






* Mon May 18 2020 Marcus Meissner <>
  - libexif-0.6.22 (2020-05-18) release:
    * New translations: ms
    * Updated translations for most languages
    * Fixed C89 compatibility
    * Fixed warnings on recent versions of autoconf
    * Some useful EXIF 2.3 tag added:
    * Lots of fixes exposed by fuzzers like AFL, ClusterFuzz, OSSFuzz and others.
    * CVE-2018-20030: Fix for recursion DoS (bsc#1120943)
    * CVE-2020-13114: Time consumption DoS when parsing canon array markers (bsc#1172121)
    * CVE-2020-13113: Potential use of uninitialized memory  (bsc#1172105)
    * CVE-2020-13112: Various buffer overread fixes due to integer overflows in maker notes (bsc#1172116)
    * CVE-2020-0093: read overflow (bsc#1171847)
    * CVE-2019-9278: replaced integer overflow checks the compiler could optimize away by safer constructs (bsc#1160770)
    * CVE-2020-12767: fixed division by zero (bsc#1171475)
    * CVE-2016-6328: fixed integer overflow when parsing maker notes (bsc#1171475)
    * CVE-2017-7544: fixed buffer overread (bsc#1059893)
  - removed patch: libexif-build-date.patch (done similar upstream)
  - CVE-2016-6328.patch: in upstream release
  - CVE-2017-7544.patch: in upstream release
  - libexif-CVE-2018-20030.patch: in upstream release
  - libexif-CVE-2019-9278.patch: in upstream release
* Fri Jan 31 2020 Marcus Meissner <>
  - libexif-CVE-2019-9278.patch: fixed an integer overflow on large
    file handling (bsc#1160770 CVE-2019-9278)
  - libexif-CVE-2018-20030.patch: Fixed a denial of service by endless
    recursion  (bsc#1120943 CVE-2018-20030)
* Wed Jan 24 2018
  - Remove %__-type macro indirections. Fix SRPM group.
  - Use %_smp_mflags for parallel build.
  - Drop pointless --with-pic (no effect since --disable-static).
* Wed Jan 17 2018
  - Add CVE-2016-6328.patch: Fix integer overflow in parsing MNOTE
    entry data of the input file (bnc#1055857)
  - Add CVE-2017-7544.patch: Fix vulnerable out-of-bounds heap read
    vulnerability (bnc#1059893)
* Mon Aug 07 2017
  - add a libexif-devel-biarch for building with -m32
* Tue Aug 26 2014
  - Add obsoletes/provides to baselibs.conf.
* Fri May 30 2014
  - fix description to be UTF-8
* Mon May 26 2014
  - Do not include timestamps in files (libexif-build-date.patch)
* Sun May 25 2014
  - Use LFS_CFLAGS in 32 bit systems.
* Thu Jul 12 2012
  - updated to 0.6.21
    * Fixed some buffer overflows in exif_entry_format_value()
      This fixes CVE-2012-2814.  Reported by Mateusz Jurczyk of
      Google Security Team
    * Fixed an off-by-one error in exif_convert_utf16_to_utf8()
      This can cause a one-byte NUL write past the end of the buffer.
      This fixes CVE-2012-2840
    * Don't read past the end of a tag when converting from UTF-16
      This fixes CVE-2012-2813. Reported by Mateusz Jurczyk of
      Google Security Team
    * Fixed an out of bounds read on corrupted input
      The EXIF_TAG_COPYRIGHT tag ought to be, but perhaps is not,
      This fixes CVE-2012-2812. Reported by Mateusz Jurczyk of
      Google Security Team
    * Fixed a buffer overflow problem in exif_entry_get_value
      If the application passed in a buffer length of 0, then it would
      be treated as the buffer had unlimited length.
      This fixes CVE-2012-2841
    * Fix a buffer overflow on corrupt EXIF data.
      This fixes bug #3434540 and fixes part of CVE-2012-2836
      Reported by Yunho Kim
    * Fix a buffer overflow on corrupted JPEG data
      An unsigned data length might wrap around when decremented
      below zero, bypassing sanity checks on length.
      This code path can probably only occur if exif_data_load_data()
      is called directly by the application on data that wasn't parsed
      by libexif itself.
      This solves the other part of CVE-2012-2836
    * Fixed some possible division-by-zeros in Olympus-style makernotes
      This fixes bug #3434545, a.k.a. CVE-2012-2837
      Reported by Yunho Kim
    * lots and lots of translations updates.
    * added more Canon lenses.
    * changed "knots" to "nautical miles"



Generated by rpm2html 1.8.1

Fabrice Bellet, Sun Jun 9 12:16:25 2024