[Git][security-tracker-team/security-tracker][master] CVE-2017-14864, CVE-2017-14862 and CVE-2017-14859 for exiv2 fixed in unstable
Salvatore Bonaccorso
carnil at debian.org
Sun Feb 2 13:21:39 GMT 2020
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
6c57ed10 by Salvatore Bonaccorso at 2020-02-02T14:21:09+01:00
CVE-2017-14864, CVE-2017-14862 and CVE-2017-14859 for exiv2 fixed in unstable
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -137689,7 +137689,7 @@ CVE-2017-14865 (There is a heap-based buffer overflow in the Exiv2::us2Data func
NOTE: Reproducible in experimental(0.26-1) with valgrind (and "free(): corrupted unsorted chunks" without valgrind).
CVE-2017-14864 (An Invalid memory address dereference was discovered in Exiv2::getULon ...)
{DLA-1147-1}
- - exiv2 <unfixed>
+ - exiv2 0.27.2-6
[buster] - exiv2 <ignored> (Minor issue)
[stretch] - exiv2 <ignored> (Minor issue)
[jessie] - exiv2 <ignored> (Minor issue)
@@ -137697,8 +137697,6 @@ CVE-2017-14864 (An Invalid memory address dereference was discovered in Exiv2::g
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1494467
NOTE: Patches here: https://github.com/Exiv2/exiv2/pull/110
NOTE: Depends on: https://github.com/Exiv2/exiv2/commit/65f45a350516bfde4941d7906f2d67462f48d1ca
- NOTE: Unreproducible on wheezy/jessie/stretch/sid(0.25-3.1).
- NOTE: Reproducible in experimental(0.26-1) with valgrind (and segfault without valgrind).
CVE-2017-14863 (A NULL pointer dereference was discovered in Exiv2::Image::printIFDStr ...)
[experimental] - exiv2 <unfixed> (low; bug #888866)
- exiv2 <not-affected> (Vulnerable code introduced after 0.25)
@@ -137708,7 +137706,7 @@ CVE-2017-14863 (A NULL pointer dereference was discovered in Exiv2::Image::print
NOTE: Reproducible in experimental(0.26-1) with valgrind (and "free(): invalid next size (fast)" without valgrind).
CVE-2017-14862 (An Invalid memory address dereference was discovered in Exiv2::DataVal ...)
{DLA-1147-1}
- - exiv2 <unfixed>
+ - exiv2 0.27.2-6
[buster] - exiv2 <ignored> (Minor issue)
[stretch] - exiv2 <ignored> (Minor issue)
[jessie] - exiv2 <ignored> (Minor issue)
@@ -137716,8 +137714,6 @@ CVE-2017-14862 (An Invalid memory address dereference was discovered in Exiv2::D
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1494786
NOTE: Patches here: https://github.com/Exiv2/exiv2/pull/110
NOTE: Depends on: https://github.com/Exiv2/exiv2/commit/65f45a350516bfde4941d7906f2d67462f48d1ca
- NOTE: Unreproducible on wheezy/jessie/stretch/sid(0.25-3.1).
- NOTE: Reproducible in experimental(0.26-1) with valgrind (and segfault without valgrind).
CVE-2017-14861 (There is a stack consumption vulnerability in the Exiv2::Internal::str ...)
[experimental] - exiv2 <unfixed> (bug #880027)
- exiv2 <not-affected> (printIFDStructure introduced in 0.26)
@@ -137735,7 +137731,7 @@ CVE-2017-14860 (There is a heap-based buffer over-read in the Exiv2::Jp2Image::r
NOTE: Reproducible in experimental(0.26-1) with valgrind (and segfault without valgrind).
CVE-2017-14859 (An Invalid memory address dereference was discovered in Exiv2::StringV ...)
{DLA-1147-1}
- - exiv2 <unfixed>
+ - exiv2 0.27.2-6
[buster] - exiv2 <ignored> (Minor issue)
[stretch] - exiv2 <ignored> (Minor issue)
[jessie] - exiv2 <ignored> (Minor issue)
@@ -137743,8 +137739,6 @@ CVE-2017-14859 (An Invalid memory address dereference was discovered in Exiv2::S
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1494780
NOTE: Patches here: https://github.com/Exiv2/exiv2/pull/110
NOTE: Depends on: https://github.com/Exiv2/exiv2/commit/65f45a350516bfde4941d7906f2d67462f48d1ca
- NOTE: Unreproducible on wheezy/jessie/stretch/sid(0.25-3.1).
- NOTE: Reproducible in experimental(0.26-1).
CVE-2017-14858 (There is a heap-based buffer overflow in the Exiv2::l2Data function of ...)
- exiv2 <not-affected> (TIFF meta data handler doesn't parse ICC profiles; only affected experimental; bug #897134)
NOTE: https://github.com/Exiv2/exiv2/issues/138
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/6c57ed10fbe38ff8445db275029342b4558d9771
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/6c57ed10fbe38ff8445db275029342b4558d9771
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200202/1f770ece/attachment.html>
More information about the debian-security-tracker-commits
mailing list