File _patchinfo of Package patchinfo.9137
<patchinfo incident="9137">
<issue tracker="bnc" id="1050257">VUL-0: CVE-2017-11591: exiv2: Floating point exception in Exiv2::ValueType</issue>
<issue tracker="bnc" id="1060995">VUL-1: CVE-2017-14864: exiv2: Invalid memory address dereference in Exiv2::getULong(types.cpp:246)</issue>
<issue tracker="bnc" id="1060996">VUL-0: CVE-2017-14862: exiv2: Invalid memory address dereference in Exiv2::DataValue::read (value.cpp:193)</issue>
<issue tracker="bnc" id="1061000">VUL-0: CVE-2017-14859: exiv2: Invalid memory address dereference in Exiv2::StringValueBase::read ( in value.cpp:302)</issue>
<issue tracker="bnc" id="1051188">VUL-1: CVE-2017-11683: exiv2: DoS via triggered assertion in tiffvisitor.cpp</issue>
<issue tracker="bnc" id="1072928">VUL-1: CVE-2017-17669: exiv2: There is a heap-based buffer over-read in theExiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp in Exiv20.26. A crafted PNG file will lead to a remote denial of service attack.</issue>
<issue tracker="bnc" id="1092952">VUL-1: CVE-2018-10958: exiv2: In types.cpp a large size value may lead to a SIGABRT during an attempt at memory allocation for an Exiv2::Internal::PngChunk::zlibUncompresscall.</issue>
<issue tracker="bnc" id="1093095">VUL-1: CVE-2018-10998: exiv2: readMetadata in jp2image.cpp allowsremote attackers to cause a denial of service (SIGABRT)</issue>
<issue tracker="bnc" id="1095070">VUL-1: CVE-2018-11531: exiv2: heap-based buffer overflow in getData in preview.cpp</issue>
<issue tracker="cve" id="2017-11591"/>
<issue tracker="cve" id="2017-14864"/>
<issue tracker="cve" id="2017-14862"/>
<issue tracker="cve" id="2017-14859"/>
<issue tracker="cve" id="2017-11683"/>
<issue tracker="cve" id="2017-17669"/>
<issue tracker="cve" id="2018-10958"/>
<issue tracker="cve" id="2018-10998"/>
<issue tracker="cve" id="2018-11531"/>
<category>security</category>
<rating>moderate</rating>
<packager>dirkmueller</packager>
<description>This update for exiv2 fixes the following issues:
- CVE-2017-11591: A floating point exception in the Exiv2::ValueType function could lead to a remote denial of service attack via crafted input. (bsc#1050257)
- CVE-2017-14864: An invalid memory address dereference was discovered in Exiv2::getULong in types.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1060995)
- CVE-2017-14862: An invalid memory address dereference was discovered in Exiv2::DataValue::read in value.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1060996)
- CVE-2017-14859: An invalid memory address dereference was discovered in Exiv2::StringValueBase::read in value.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1061000)
- CVE-2017-11683: There is a reachable assertion in the Internal::TiffReader::visitDirectory function in tiffvisitor.cpp that could lead to a remote denial of service attack via crafted input. (bsc#1051188)
- CVE-2017-17669: There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp. A crafted PNG file would lead to a remote denial of service attack. (bsc#1072928)
- CVE-2018-10958: In types.cpp a large size value might have lead to a SIGABRT during an attempt at memory allocation for an Exiv2::Internal::PngChunk::zlibUncompress call. (bsc#1092952)
- CVE-2018-10998: readMetadata in jp2image.cpp allowed remote attackers to cause a denial of service (SIGABRT) by triggering an incorrect Safe::add call. (bsc#1093095)
- CVE-2018-11531: Exiv2 had a heap-based buffer overflow in getData in preview.cpp. (bsc#1095070)
</description>
<summary>Security update for exiv2</summary>
</patchinfo>