SUSE-SU-2018:3882-2

Source
https://www.suse.com/support/update/announcement/2018/suse-su-20183882-2/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2018:3882-2.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2018:3882-2
Related
Published
2018-12-12T15:06:31Z
Modified
2018-12-12T15:06:31Z
Summary
Security update for exiv2
Details

This update for exiv2 fixes the following issues:

  • CVE-2017-11591: A floating point exception in the Exiv2::ValueType function could lead to a remote denial of service attack via crafted input. (bsc#1050257)
  • CVE-2017-14864: An invalid memory address dereference was discovered in Exiv2::getULong in types.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1060995)
  • CVE-2017-14862: An invalid memory address dereference was discovered in Exiv2::DataValue::read in value.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1060996)
  • CVE-2017-14859: An invalid memory address dereference was discovered in Exiv2::StringValueBase::read in value.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1061000)
  • CVE-2017-11683: There is a reachable assertion in the Internal::TiffReader::visitDirectory function in tiffvisitor.cpp that could lead to a remote denial of service attack via crafted input. (bsc#1051188)
  • CVE-2017-17669: There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp. A crafted PNG file would lead to a remote denial of service attack. (bsc#1072928)
  • CVE-2018-10958: In types.cpp a large size value might have lead to a SIGABRT during an attempt at memory allocation for an Exiv2::Internal::PngChunk::zlibUncompress call. (bsc#1092952)
  • CVE-2018-10998: readMetadata in jp2image.cpp allowed remote attackers to cause a denial of service (SIGABRT) by triggering an incorrect Safe::add call. (bsc#1093095)
  • CVE-2018-11531: Exiv2 had a heap-based buffer overflow in getData in preview.cpp. (bsc#1095070)
References

Affected packages

SUSE:Linux Enterprise Desktop 12 SP4 / exiv2

Package

Name
exiv2
Purl
pkg:rpm/suse/exiv2&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.23-12.5.1

Ecosystem specific

{
    "binaries": [
        {
            "libexiv2-12": "0.23-12.5.1"
        }
    ]
}

SUSE:Linux Enterprise Software Development Kit 12 SP4 / exiv2

Package

Name
exiv2
Purl
pkg:rpm/suse/exiv2&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.23-12.5.1

Ecosystem specific

{
    "binaries": [
        {
            "libexiv2-devel": "0.23-12.5.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP4 / exiv2

Package

Name
exiv2
Purl
pkg:rpm/suse/exiv2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.23-12.5.1

Ecosystem specific

{
    "binaries": [
        {
            "libexiv2-12": "0.23-12.5.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 SP4 / exiv2

Package

Name
exiv2
Purl
pkg:rpm/suse/exiv2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.23-12.5.1

Ecosystem specific

{
    "binaries": [
        {
            "libexiv2-12": "0.23-12.5.1"
        }
    ]
}