CVE-2017-17723 (https://nvd.nist.gov/vuln/detail/CVE-2017-17723): In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::Image::byteSwap4 function in image.cpp. Remote attackers can exploit this vulnerability to disclose memory data or cause a denial of service via a crafted TIFF file.
Fixed by: https://github.com/Exiv2/exiv2/commit/36df4bc997d74ecc447e4541e2fc3fda10586103
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f33aacc28aa4a62c2123dbbecfbdb911dd4ba470 commit f33aacc28aa4a62c2123dbbecfbdb911dd4ba470 Author: Andreas Sturmlechner <asturm@gentoo.org> AuthorDate: 2018-09-18 20:45:33 +0000 Commit: Andreas Sturmlechner <asturm@gentoo.org> CommitDate: 2018-09-18 20:53:50 +0000 media-gfx/exiv2: Add 0.26_p20180811 snapshot Custom packed tarball based on upstream 0.26 branch as of 2018-08-11, fixing CVE-2018-12264, CVE-2018-12265, with downstream updated config.{guess,sub} and fixed CVE-2017-17723. Bug: https://bugs.gentoo.org/647812 Bug: https://bugs.gentoo.org/658236 Closes: https://bugs.gentoo.org/663870 Package-Manager: Portage-2.3.49, Repoman-2.3.10 media-gfx/exiv2/Manifest | 1 + media-gfx/exiv2/exiv2-0.26_p20180811.ebuild | 123 ++++++++++++++++++++++++++++ 2 files changed, 124 insertions(+)
Cleanup/KDE done here.
Arches and Maintainer(s), Thank you for your work. New GLSA Request filed.
This issue was resolved and addressed in GLSA 201811-14 at https://security.gentoo.org/glsa/201811-14 by GLSA coordinator Aaron Bauman (b-man).