Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP2:Update
patchinfo.9137
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.9137
<patchinfo incident="9137"> <issue tracker="bnc" id="1050257">VUL-0: CVE-2017-11591: exiv2: Floating point exception in Exiv2::ValueType</issue> <issue tracker="bnc" id="1060995">VUL-1: CVE-2017-14864: exiv2: Invalid memory address dereference in Exiv2::getULong(types.cpp:246)</issue> <issue tracker="bnc" id="1060996">VUL-0: CVE-2017-14862: exiv2: Invalid memory address dereference in Exiv2::DataValue::read (value.cpp:193)</issue> <issue tracker="bnc" id="1061000">VUL-0: CVE-2017-14859: exiv2: Invalid memory address dereference in Exiv2::StringValueBase::read ( in value.cpp:302)</issue> <issue tracker="bnc" id="1051188">VUL-1: CVE-2017-11683: exiv2: DoS via triggered assertion in tiffvisitor.cpp</issue> <issue tracker="bnc" id="1072928">VUL-1: CVE-2017-17669: exiv2: There is a heap-based buffer over-read in theExiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp in Exiv20.26. A crafted PNG file will lead to a remote denial of service attack.</issue> <issue tracker="bnc" id="1092952">VUL-1: CVE-2018-10958: exiv2: In types.cpp a large size value may lead to a SIGABRT during an attempt at memory allocation for an Exiv2::Internal::PngChunk::zlibUncompresscall.</issue> <issue tracker="bnc" id="1093095">VUL-1: CVE-2018-10998: exiv2: readMetadata in jp2image.cpp allowsremote attackers to cause a denial of service (SIGABRT)</issue> <issue tracker="bnc" id="1095070">VUL-1: CVE-2018-11531: exiv2: heap-based buffer overflow in getData in preview.cpp</issue> <issue tracker="cve" id="2017-11591"/> <issue tracker="cve" id="2017-14864"/> <issue tracker="cve" id="2017-14862"/> <issue tracker="cve" id="2017-14859"/> <issue tracker="cve" id="2017-11683"/> <issue tracker="cve" id="2017-17669"/> <issue tracker="cve" id="2018-10958"/> <issue tracker="cve" id="2018-10998"/> <issue tracker="cve" id="2018-11531"/> <category>security</category> <rating>moderate</rating> <packager>dirkmueller</packager> <description>This update for exiv2 fixes the following issues: - CVE-2017-11591: A floating point exception in the Exiv2::ValueType function could lead to a remote denial of service attack via crafted input. (bsc#1050257) - CVE-2017-14864: An invalid memory address dereference was discovered in Exiv2::getULong in types.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1060995) - CVE-2017-14862: An invalid memory address dereference was discovered in Exiv2::DataValue::read in value.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1060996) - CVE-2017-14859: An invalid memory address dereference was discovered in Exiv2::StringValueBase::read in value.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1061000) - CVE-2017-11683: There is a reachable assertion in the Internal::TiffReader::visitDirectory function in tiffvisitor.cpp that could lead to a remote denial of service attack via crafted input. (bsc#1051188) - CVE-2017-17669: There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp. A crafted PNG file would lead to a remote denial of service attack. (bsc#1072928) - CVE-2018-10958: In types.cpp a large size value might have lead to a SIGABRT during an attempt at memory allocation for an Exiv2::Internal::PngChunk::zlibUncompress call. (bsc#1092952) - CVE-2018-10998: readMetadata in jp2image.cpp allowed remote attackers to cause a denial of service (SIGABRT) by triggering an incorrect Safe::add call. (bsc#1093095) - CVE-2018-11531: Exiv2 had a heap-based buffer overflow in getData in preview.cpp. (bsc#1095070) </description> <summary>Security update for exiv2</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor