In Exiv2 0.26, there is a heap-based buffer over-read in the
Exiv2::IptcData::printStructure function in iptc.cpp. Remote attackers can
exploit this vulnerability to cause a denial of service via a crafted TIFF
Plus 'secondary' issue: https://github.com/Exiv2/exiv2/issues/209
See also: https://github.com/Exiv2/exiv2/pull/180
This change is rather substantial, so that it won't make much sense anymore to backport to 0.26 branch.
The bug has been referenced in the following commit(s):
Author: Andreas Sturmlechner <email@example.com>
AuthorDate: 2018-09-21 13:47:24 +0000
Commit: Andreas Sturmlechner <firstname.lastname@example.org>
CommitDate: 2018-09-21 13:57:05 +0000
media-gfx/exiv2: Tarball respun for CVE-2017-17724
Custom packed tarball based on upstream 0.26 branch as of 2018-08-11,
with additional fixes from git master.
Ignore massive test suite changes, since we do not use it at all in 0.26.
Package-Manager: Portage-2.3.49, Repoman-2.3.10
media-gfx/exiv2/Manifest | 1 +
media-gfx/exiv2/exiv2-0.26_p20180811-r2.ebuild | 123 +++++++++++++++++++++++++
2 files changed, 124 insertions(+)
Cleanup/KDE done here.
Arches and Maintainer(s), Thank you for your work.
New GLSA Request filed.
This issue was resolved and addressed in
GLSA 201811-14 at https://security.gentoo.org/glsa/201811-14
by GLSA coordinator Aaron Bauman (b-man).