CVE-2017-17724 (https://nvd.nist.gov/vuln/detail/CVE-2017-17724): In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file.
Plus 'secondary' issue: https://github.com/Exiv2/exiv2/issues/209
See also: https://github.com/Exiv2/exiv2/pull/180 This change is rather substantial, so that it won't make much sense anymore to backport to 0.26 branch.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=58faaacd193af38a758055cb35d9a6082486bea6 commit 58faaacd193af38a758055cb35d9a6082486bea6 Author: Andreas Sturmlechner <asturm@gentoo.org> AuthorDate: 2018-09-21 13:47:24 +0000 Commit: Andreas Sturmlechner <asturm@gentoo.org> CommitDate: 2018-09-21 13:57:05 +0000 media-gfx/exiv2: Tarball respun for CVE-2017-17724 Custom packed tarball based on upstream 0.26 branch as of 2018-08-11, with additional fixes from git master. Ignore massive test suite changes, since we do not use it at all in 0.26. Bug: https://bugs.gentoo.org/647810 Package-Manager: Portage-2.3.49, Repoman-2.3.10 media-gfx/exiv2/Manifest | 1 + media-gfx/exiv2/exiv2-0.26_p20180811-r2.ebuild | 123 +++++++++++++++++++++++++ 2 files changed, 124 insertions(+)
Cleanup/KDE done here.
Arches and Maintainer(s), Thank you for your work. New GLSA Request filed.
This issue was resolved and addressed in GLSA 201811-14 at https://security.gentoo.org/glsa/201811-14 by GLSA coordinator Aaron Bauman (b-man).