Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 632231 (CVE-2017-14857, CVE-2017-14858, CVE-2017-14859, CVE-2017-14860, CVE-2017-14861, CVE-2017-14862, CVE-2017-14863, CVE-2017-14864, CVE-2017-14865, CVE-2017-14866)

Summary: <media-gfx/exiv2-0.26_p20171104: Multiple vulnerabilities
Product: Gentoo Security Reporter: Aleksandr Wagner (Kivak) <alwag>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: graphics+disabled
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
See Also: https://github.com/Exiv2/exiv2/issues/73
Whiteboard: B3 [noglsa cve]
Package list:
Runtime testing required: ---
Bug Depends on:    
Bug Blocks: 628264, 628396, 635220    

Description Aleksandr Wagner (Kivak) 2017-09-28 13:43:40 UTC
CVE-2017-14866 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14866):

There is a heap-based buffer overflow in the Exiv2::s2Data function of types.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack. 

References:

https://bugzilla.redhat.com/show_bug.cgi?id=1494781

CVE-2017-14865 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14865):

There is a heap-based buffer overflow in the Exiv2::us2Data function of types.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack. 

References:

https://bugzilla.redhat.com/show_bug.cgi?id=1494778

CVE-2017-14864 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14864):

An Invalid memory address dereference was discovered in Exiv2::getULong in types.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service. 

References:

https://bugzilla.redhat.com/show_bug.cgi?id=1494467
Comment 1 Aleksandr Wagner (Kivak) 2017-09-28 13:48:00 UTC
CVE-2017-14858 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14858):

There is a heap-based buffer overflow in the Exiv2::l2Data function of types.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack. 

References:

https://bugzilla.redhat.com/show_bug.cgi?id=1494782

CVE-2017-14857 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14857)

In Exiv2 0.26, there is an invalid free in the Image class in image.cpp that leads to a Segmentation fault. A crafted input will lead to a denial of service attack. 

References:

https://bugzilla.redhat.com/show_bug.cgi?id=1495043
Comment 2 Andreas Sturmlechner gentoo-dev 2017-10-13 08:45:34 UTC
At least part of these CVEs is fixed in snapshot 0.26_p20171013.
Comment 3 Andreas Sturmlechner gentoo-dev 2017-10-23 23:41:24 UTC
Current snapshot media-gfx/exiv2-0.26_p20171018 should be unaffected.
Comment 4 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-10-24 00:34:55 UTC
(In reply to Andreas Sturmlechner from comment #3)
> Current snapshot media-gfx/exiv2-0.26_p20171018 should be unaffected.

Thank you Andreas, could you please call for stabilization here when ready?
Comment 5 Andreas Sturmlechner gentoo-dev 2017-11-19 15:30:47 UTC
Cleanup done in git commit cdb23e8b3608be50daebdeb5d904b179a58d8339