Security update for exiv2
Announcement ID: | SUSE-SU-2018:3882-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves nine vulnerabilities can now be installed.
Description:
This update for exiv2 fixes the following issues:
- CVE-2017-11591: A floating point exception in the Exiv2::ValueType function could lead to a remote denial of service attack via crafted input. (bsc#1050257)
- CVE-2017-14864: An invalid memory address dereference was discovered in Exiv2::getULong in types.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1060995)
- CVE-2017-14862: An invalid memory address dereference was discovered in Exiv2::DataValue::read in value.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1060996)
- CVE-2017-14859: An invalid memory address dereference was discovered in Exiv2::StringValueBase::read in value.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1061000)
- CVE-2017-11683: There is a reachable assertion in the Internal::TiffReader::visitDirectory function in tiffvisitor.cpp that could lead to a remote denial of service attack via crafted input. (bsc#1051188)
- CVE-2017-17669: There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp. A crafted PNG file would lead to a remote denial of service attack. (bsc#1072928)
- CVE-2018-10958: In types.cpp a large size value might have lead to a SIGABRT during an attempt at memory allocation for an Exiv2::Internal::PngChunk::zlibUncompress call. (bsc#1092952)
- CVE-2018-10998: readMetadata in jp2image.cpp allowed remote attackers to cause a denial of service (SIGABRT) by triggering an incorrect Safe::add call. (bsc#1093095)
- CVE-2018-11531: Exiv2 had a heap-based buffer overflow in getData in preview.cpp. (bsc#1095070)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Desktop 12 SP3
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-2772=1
-
SUSE Linux Enterprise Software Development Kit 12 SP3
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-2772=1
-
SUSE Linux Enterprise Server 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2772=1
-
SUSE Linux Enterprise High Performance Computing 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2772=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2772=1
Package List:
-
SUSE Linux Enterprise Desktop 12 SP3 (x86_64)
- exiv2-debuginfo-0.23-12.5.1
- libexiv2-12-debuginfo-0.23-12.5.1
- libexiv2-12-0.23-12.5.1
- exiv2-debugsource-0.23-12.5.1
-
SUSE Linux Enterprise Software Development Kit 12 SP3 (aarch64 ppc64le s390x x86_64)
- exiv2-debuginfo-0.23-12.5.1
- libexiv2-devel-0.23-12.5.1
- exiv2-debugsource-0.23-12.5.1
-
SUSE Linux Enterprise Server 12 SP3 (aarch64 ppc64le s390x x86_64)
- exiv2-debuginfo-0.23-12.5.1
- libexiv2-12-debuginfo-0.23-12.5.1
- libexiv2-12-0.23-12.5.1
- exiv2-debugsource-0.23-12.5.1
-
SUSE Linux Enterprise High Performance Computing 12 SP3 (aarch64 x86_64)
- exiv2-debuginfo-0.23-12.5.1
- libexiv2-12-debuginfo-0.23-12.5.1
- libexiv2-12-0.23-12.5.1
- exiv2-debugsource-0.23-12.5.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP3 (ppc64le x86_64)
- exiv2-debuginfo-0.23-12.5.1
- libexiv2-12-debuginfo-0.23-12.5.1
- libexiv2-12-0.23-12.5.1
- exiv2-debugsource-0.23-12.5.1
References:
- https://www.suse.com/security/cve/CVE-2017-11591.html
- https://www.suse.com/security/cve/CVE-2017-11683.html
- https://www.suse.com/security/cve/CVE-2017-14859.html
- https://www.suse.com/security/cve/CVE-2017-14862.html
- https://www.suse.com/security/cve/CVE-2017-14864.html
- https://www.suse.com/security/cve/CVE-2017-17669.html
- https://www.suse.com/security/cve/CVE-2018-10958.html
- https://www.suse.com/security/cve/CVE-2018-10998.html
- https://www.suse.com/security/cve/CVE-2018-11531.html
- https://bugzilla.suse.com/show_bug.cgi?id=1050257
- https://bugzilla.suse.com/show_bug.cgi?id=1051188
- https://bugzilla.suse.com/show_bug.cgi?id=1060995
- https://bugzilla.suse.com/show_bug.cgi?id=1060996
- https://bugzilla.suse.com/show_bug.cgi?id=1061000
- https://bugzilla.suse.com/show_bug.cgi?id=1072928
- https://bugzilla.suse.com/show_bug.cgi?id=1092952
- https://bugzilla.suse.com/show_bug.cgi?id=1093095
- https://bugzilla.suse.com/show_bug.cgi?id=1095070