{"id":"ALSA-2020:1577","summary":"Moderate: exiv2 security, bug fix, and enhancement update","details":"The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments.\n\nThe following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917)\n\nSecurity Fix(es):\n\n* exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421)\n\n* exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005)\n\n* exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868)\n\n* exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303)\n\n* exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304)\n\n* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305)\n\n* exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772)\n\n* exiv2: information leak via a crafted file (CVE-2018-11037)\n\n* exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338)\n\n* exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229)\n\n* exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230)\n\n* exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282)\n\n* exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581)\n\n* exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915)\n\n* exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107)\n\n* exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108)\n\n* exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535)\n\n* exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607)\n\n* exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096)\n\n* exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097)\n\n* exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098)\n\n* exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099)\n\n* exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143)\n\n* exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109)\n\n* exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111)\n\n* exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112)\n\n* exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113)\n\n* exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114)\n\n* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.","modified":"2026-02-04T02:21:00.951270Z","published":"2020-04-28T08:52:31Z","related":["CVE-2017-18005","CVE-2018-10772","CVE-2018-11037","CVE-2018-14338","CVE-2018-17229","CVE-2018-17230","CVE-2018-17282","CVE-2018-17581","CVE-2018-18915","CVE-2018-19107","CVE-2018-19108","CVE-2018-19535","CVE-2018-19607","CVE-2018-20096","CVE-2018-20097","CVE-2018-20098","CVE-2018-20099","CVE-2018-4868","CVE-2018-9303","CVE-2018-9304","CVE-2018-9305","CVE-2018-9306","CVE-2019-13109","CVE-2019-13111","CVE-2019-13112","CVE-2019-13113","CVE-2019-13114","CVE-2019-20421","CVE-2019-9143"],"references":[{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2020-1577.html"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2017-18005"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-10772"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-11037"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-14338"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-17229"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-17230"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-17282"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-17581"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-18915"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-19107"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-19108"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-19535"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-19607"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-20096"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-20097"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-20098"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-20099"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-4868"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-9303"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-9304"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-9305"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-9306"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-13109"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-13111"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-13112"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-13113"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-13114"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-20421"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-9143"}],"affected":[{"package":{"name":"exiv2-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/exiv2-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.27.2-5.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2020:1577.json"}},{"package":{"name":"exiv2-doc","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/exiv2-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.27.2-5.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2020:1577.json"}},{"package":{"name":"gegl","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/gegl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.2.0-39.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2020:1577.json"}},{"package":{"name":"gnome-color-manager","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/gnome-color-manager"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.28.0-3.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2020:1577.json"}},{"package":{"name":"libgexiv2","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/libgexiv2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.10.8-4.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2020:1577.json"}},{"package":{"name":"libgexiv2-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/libgexiv2-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.10.8-4.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2020:1577.json"}}],"schema_version":"1.7.3"}