Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:4208-1

Опубликовано: 23 нояб. 2022
Источник: suse-cvrf

Описание

Security update for exiv2-0_26

This update for exiv2-0_26 fixes the following issues:

  • CVE-2019-17402: Fixed improper validation of the total size to the offset and size leads to a crash in Exiv2::getULong in types.cpp (bsc#1153577).
  • CVE-2018-20098: Fixed a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header (bsc#1119560).
  • CVE-2018-17581: Fixed an excessive stack consumption CiffDirectory:readDirectory() at crwimage_int.cpp (bsc#1110282).
  • CVE-2018-20099: exiv2: infinite loop in Exiv2::Jp2Image::encodeJp2Header (bsc#1119559).
  • CVE-2018-20097: Fixed SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroupsu (bsc#1119562).
  • CVE-2017-11591: Fixed a floating point exception in Exiv2::ValueType (bsc#1050257).
  • CVE-2018-11531: Fixed a heap-based buffer overflow in getData in preview.cpp (bsc#1095070).
  • CVE-2021-32815: Fixed a deny-of-service due to assertion failure in crwimage_int.cpp (bsc#1189337).
  • CVE-2021-29473: Fixed out-of-bounds read in Exiv2::Jp2Image:doWriteMetadata (bsc#1186231).
  • CVE-2019-13109: Fixed a denial of service in PngImage:readMetadata (bsc#1142677).
  • CVE-2019-13110: Fixed an integer-overflow and out-of-bounds read in CiffDirectory:readDirectory leads to denail of service (bsc#1142678).

Список пакетов

SUSE Linux Enterprise Module for Desktop Applications 15 SP4
libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4
libexiv2-26-0.26-150400.9.21.1
libexiv2-26-32bit-0.26-150400.9.21.1

Описание

There is a Floating point exception in the Exiv2::ValueType function in Exiv2 0.26 that will lead to a remote denial of service attack via crafted input.


Затронутые продукты
SUSE Linux Enterprise Module for Desktop Applications 15 SP4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-32bit-0.26-150400.9.21.1

Ссылки

Описание

Exiv2 0.26 has a heap-based buffer overflow in getData in preview.cpp.


Затронутые продукты
SUSE Linux Enterprise Module for Desktop Applications 15 SP4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-32bit-0.26-150400.9.21.1

Ссылки

Описание

CiffDirectory::readDirectory() at crwimage_int.cpp in Exiv2 0.26 has excessive stack consumption due to a recursive function, leading to Denial of service.


Затронутые продукты
SUSE Linux Enterprise Module for Desktop Applications 15 SP4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-32bit-0.26-150400.9.21.1

Ссылки

Описание

There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.


Затронутые продукты
SUSE Linux Enterprise Module for Desktop Applications 15 SP4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-32bit-0.26-150400.9.21.1

Ссылки

Описание

There is a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.


Затронутые продукты
SUSE Linux Enterprise Module for Desktop Applications 15 SP4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-32bit-0.26-150400.9.21.1

Ссылки

Описание

There is an infinite loop in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.


Затронутые продукты
SUSE Linux Enterprise Module for Desktop Applications 15 SP4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-32bit-0.26-150400.9.21.1

Ссылки

Описание

An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction.


Затронутые продукты
SUSE Linux Enterprise Module for Desktop Applications 15 SP4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-32bit-0.26-150400.9.21.1

Ссылки

Описание

A CiffDirectory::readDirectory integer overflow and out-of-bounds read in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted CRW image file.


Затронутые продукты
SUSE Linux Enterprise Module for Desktop Applications 15 SP4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-32bit-0.26-150400.9.21.1

Ссылки

Описание

Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the relationship of the total size to the offset and size.


Затронутые продукты
SUSE Linux Enterprise Module for Desktop Applications 15 SP4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-32bit-0.26-150400.9.21.1

Ссылки

Описание

Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security.


Затронутые продукты
SUSE Linux Enterprise Module for Desktop Applications 15 SP4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-32bit-0.26-150400.9.21.1

Ссылки

Описание

Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The assertion failure is triggered when Exiv2 is used to modify the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when modifying the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `fi`. ### Patches The bug is fixed in version v0.27.5. ### References Regression test and bug fix: #1739 ### For more information Please see our [security policy](https://github.com/Exiv2/exiv2/security/policy) for information about Exiv2 security.


Затронутые продукты
SUSE Linux Enterprise Module for Desktop Applications 15 SP4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-0.26-150400.9.21.1
openSUSE Leap 15.4:libexiv2-26-32bit-0.26-150400.9.21.1

Ссылки
Уязвимость SUSE-SU-2022:4208-1