You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa exiv2

Sigurnosni nedostaci programskog paketa exiv2

  • Detalji os-a: WN7
  • Važnost: INF
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2018-fc9c5969b4
2018-05-19 21:33:56.241593
——————————————————————————–

Name : exiv2
Product : Fedora 27
Version : 0.26
Release : 10.fc27
URL : http://www.exiv2.org/
Summary : Exif and Iptc metadata manipulation library
Description :
A command line utility to access image metadata, allowing one to:
* print the Exif metadata of Jpeg images as summary info, interpreted values,
or the plain data for each tag
* print the Iptc metadata of Jpeg images
* print the Jpeg comment of Jpeg images
* set, add and delete Exif and Iptc metadata of Jpeg images
* adjust the Exif timestamp (that’s how it all started…)
* rename Exif image files according to the Exif timestamp
* extract, insert and delete Exif metadata (including thumbnails),
Iptc metadata and Jpeg comments

——————————————————————————–
Update Information:

Security update for CVE-2017-17723, CVE-2017-17725, CVE-2018-5772
——————————————————————————–
ChangeLog:

* Thu May 3 2018 Germano Massullo <germano.massullo@gmail.com> – 0.26-10
– added patches that fix CVE-2017-17723 CVE-2017-17725 CVE-2017-5772
– moved 0006-1296-Fix-submitted.patch file from sources to package tree
* Tue Feb 20 2018 Rex Dieter <rdieter@fedoraproject.org> – 0.26-9
– BR: gcc-c++
* Wed Feb 7 2018 Fedora Release Engineering <releng@fedoraproject.org> – 0.26-8
– Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
* Sat Feb 3 2018 Igor Gnatenko <ignatenkobrain@fedoraproject.org> – 0.26-7
– Switch to %ldconfig_scriptlets
——————————————————————————–
References:

[ 1 ] Bug #1545249 – CVE-2017-17723 exiv2: heap-based buffer over-read in Exiv2::Image::byteSwap4 in image.cpp
https://bugzilla.redhat.com/show_bug.cgi?id=1545249
[ 2 ] Bug #1545232 – CVE-2017-17725 exiv2: heap-based buffer over-read in Exiv2::getULong function in types.cpp
https://bugzilla.redhat.com/show_bug.cgi?id=1545232
[ 3 ] Bug #1536904 – CVE-2018-5772 exiv2: Uncontrolled recursion in image.cpp:Exiv2::Image::printIFDStructure() can allow a remote attacker to cause a denial of service via a crafted tif file
https://bugzilla.redhat.com/show_bug.cgi?id=1536904
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-fc9c5969b4’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3LGHONQ4EJ55LIOFXBWTY3MX3FETPLOB/

——————————————————————————–
Fedora Update Notification
FEDORA-2018-54c29139b3
2018-05-19 21:22:12.095160
——————————————————————————–

Name : exiv2
Product : Fedora 28
Version : 0.26
Release : 10.fc28
URL : http://www.exiv2.org/
Summary : Exif and Iptc metadata manipulation library
Description :
A command line utility to access image metadata, allowing one to:
* print the Exif metadata of Jpeg images as summary info, interpreted values,
or the plain data for each tag
* print the Iptc metadata of Jpeg images
* print the Jpeg comment of Jpeg images
* set, add and delete Exif and Iptc metadata of Jpeg images
* adjust the Exif timestamp (that’s how it all started…)
* rename Exif image files according to the Exif timestamp
* extract, insert and delete Exif metadata (including thumbnails),
Iptc metadata and Jpeg comments

——————————————————————————–
Update Information:

Security update for CVE-2017-17723, CVE-2017-17725, CVE-2018-5772
——————————————————————————–
ChangeLog:

* Thu May 3 2018 Germano Massullo <germano.massullo@gmail.com> – 0.26-10
– added patches that fix CVE-2017-17723 CVE-2017-17725 CVE-2017-5772
– moved 0006-1296-Fix-submitted.patch file from sources to package tree
* Tue Feb 20 2018 Rex Dieter <rdieter@fedoraproject.org> – 0.26-9
– BR: gcc-c++
——————————————————————————–
References:

[ 1 ] Bug #1536904 – CVE-2018-5772 exiv2: Uncontrolled recursion in image.cpp:Exiv2::Image::printIFDStructure() can allow a remote attacker to cause a denial of service via a crafted tif file
https://bugzilla.redhat.com/show_bug.cgi?id=1536904
[ 2 ] Bug #1545232 – CVE-2017-17725 exiv2: heap-based buffer over-read in Exiv2::getULong function in types.cpp
https://bugzilla.redhat.com/show_bug.cgi?id=1545232
[ 3 ] Bug #1545249 – CVE-2017-17723 exiv2: heap-based buffer over-read in Exiv2::Image::byteSwap4 in image.cpp
https://bugzilla.redhat.com/show_bug.cgi?id=1545249
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-54c29139b3’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSFVKTLL2TM4AYXVBIQOLXGBD7WXAQU/

AutorVlatka Misic
Cert idNCERT-REF-2018-05-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa ghostscript

Otkriven je sigurnosni nedostatak u programskom paketu ghostscript za operacijski sustav openSUSE. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje napada uskraćivanjem...

Close