diff --git a/openexr-CVE-2021-3598.patch b/openexr-CVE-2021-3598.patch new file mode 100644 index 0000000..817c6be --- /dev/null +++ b/openexr-CVE-2021-3598.patch @@ -0,0 +1,17 @@ +diff --git a/OpenEXR/IlmImf/ImfDeepScanLineInputFile.cpp b/OpenEXR/IlmImf/ImfDeepScanLineInputFile.cpp +index 5f0f43989..ead43c729 100644 +--- a/OpenEXR/IlmImf/ImfDeepScanLineInputFile.cpp ++++ b/OpenEXR/IlmImf/ImfDeepScanLineInputFile.cpp +@@ -647,6 +647,11 @@ LineBufferTask::execute () + + _lineBuffer->format = Compressor::XDR; + _lineBuffer->uncompressedData = _lineBuffer->buffer; ++ ++ if(_lineBuffer->packedDataSize!=maxBytesPerLine) ++ { ++ THROW (IEX_NAMESPACE::InputExc, "Incorrect size for uncompressed data. Expected " << maxBytesPerLine << " got " << _lineBuffer->packedDataSize << " bytes"); ++ } + } + } + + diff --git a/openexr.changes b/openexr.changes index 605dec4..b749eb3 100644 --- a/openexr.changes +++ b/openexr.changes @@ -1,3 +1,18 @@ +------------------------------------------------------------------- +Tue Jun 15 10:05:14 UTC 2021 - pgajdos@suse.com + +- security update +- added patches + fix CVE-2021-3598 [bsc#1187310], Heap buffer overflow in Imf_3_1:CharPtrIO:readChars + + openexr-CVE-2021-3598.patch + +------------------------------------------------------------------- +Tue Jun 15 09:28:19 UTC 2021 - pgajdos@suse.com + +- version update to 2.5.6 + * [#1013](https://github.com/AcademySoftwareFoundation/openexr/pull/1013) + Fixed regression in Imath::succf() and Imath::predf() when negative values are given + ------------------------------------------------------------------- Wed Mar 31 12:04:02 UTC 2021 - pgajdos@suse.com diff --git a/openexr.spec b/openexr.spec index 2c49d87..87d05fb 100644 --- a/openexr.spec +++ b/openexr.spec @@ -28,7 +28,7 @@ %define sonum 25 %global so_suffix -2_5 Name: %{flavor} -Version: 2.5.5 +Version: 2.5.6 Release: 0 %if "%{flavor}" == "openexr" Summary: Utilities for working with HDR images in OpenEXR format @@ -44,6 +44,8 @@ URL: http://www.openexr.com/ Source0: https://github.com/openexr/openexr/archive/v%{version}.tar.gz Source2: baselibs.conf Patch1: 0001-Use-absolute-CMAKE_INSTALL_FULL_LIBDIR-for-libdir-in.patch +# CVE-2021-3598 [bsc#1187310], Heap buffer overflow in Imf_3_1:CharPtrIO:readChars +Patch2: openexr-CVE-2021-3598.patch BuildRequires: cmake BuildRequires: gcc-c++ BuildRequires: pkgconfig @@ -223,6 +225,7 @@ Group: System/Libraries %prep %setup -q -n %{prjname}-%{version} %patch1 -p1 +%patch2 -p1 %build %if "%{flavor}" == "openexr" diff --git a/v2.5.5.tar.gz b/v2.5.5.tar.gz deleted file mode 100644 index 38b8a44..0000000 --- a/v2.5.5.tar.gz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:59e98361cb31456a9634378d0f653a2b9554b8900f233450f2396ff495ea76b3 -size 27536865 diff --git a/v2.5.6.tar.gz b/v2.5.6.tar.gz new file mode 100644 index 0000000..b1faecc --- /dev/null +++ b/v2.5.6.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:c9f4c268d91d3904b7784b7a65d1eba55334bddf391487e9f14c315fa3a362b5 +size 27540385