Summary: | <media-libs/libexif-0.6.19: Heap-based buffer overflow (CVE-2009-3895) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Alex Legler (RETIRED) <a3li> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | graphics+disabled |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://article.gmane.org/gmane.comp.graphics.libexif.devel/806 | ||
Whiteboard: | ~2 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Alex Legler (RETIRED)
![]() ![]() ![]() Stable is not affected. *** Bug 293192 has been marked as a duplicate of this bug. *** bumped in cvs, 0.6.18 versions removed. *exif-0.6.19 (14 Nov 2009) 14 Nov 2009; Markus Meier <maekke@gentoo.org> -exif-0.6.18.ebuild, +exif-0.6.19.ebuild: version bump wrt bug #293190 and bug #293194 *libexif-0.6.19 (14 Nov 2009) 14 Nov 2009; Markus Meier <maekke@gentoo.org> -libexif-0.6.18.ebuild, +libexif-0.6.19.ebuild: version bump wrt bug #293190 and bug #293194 Thanks. → noglsa CVE-2009-3895 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3895): Heap-based buffer overflow in the exif_entry_fix function (aka the tag fixup routine) in libexif/exif-entry.c in libexif 0.6.18 allows remote attackers to cause a denial of service or possibly execute arbitrary code via an invalid EXIF image. NOTE: some of these details are obtained from third party information. |