{"id":"RLSA-2020:1577","summary":"Moderate: exiv2 security, bug fix, and enhancement update","details":"The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments.\n\nThe following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917)\n\nSecurity Fix(es):\n\n* exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421)\n\n* exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005)\n\n* exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868)\n\n* exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303)\n\n* exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304)\n\n* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305)\n\n* exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772)\n\n* exiv2: information leak via a crafted file (CVE-2018-11037)\n\n* exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338)\n\n* exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229)\n\n* exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230)\n\n* exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282)\n\n* exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581)\n\n* exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915)\n\n* exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107)\n\n* exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108)\n\n* exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535)\n\n* exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607)\n\n* exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096)\n\n* exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097)\n\n* exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098)\n\n* exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099)\n\n* exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143)\n\n* exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109)\n\n* exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111)\n\n* exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112)\n\n* exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113)\n\n* exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114)\n\n* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.","modified":"2026-02-05T10:00:10.583135Z","published":"2020-04-28T08:52:31Z","upstream":["CVE-2017-18005","CVE-2018-10772","CVE-2018-11037","CVE-2018-14338","CVE-2018-17229","CVE-2018-17230","CVE-2018-17282","CVE-2018-17581","CVE-2018-18915","CVE-2018-19107","CVE-2018-19108","CVE-2018-19535","CVE-2018-19607","CVE-2018-20096","CVE-2018-20097","CVE-2018-20098","CVE-2018-20099","CVE-2018-4868","CVE-2018-9303","CVE-2018-9304","CVE-2018-9305","CVE-2018-9306","CVE-2019-13109","CVE-2019-13111","CVE-2019-13112","CVE-2019-13113","CVE-2019-13114","CVE-2019-20421","CVE-2019-9143"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2020:1577"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1531171"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1531724"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566725"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566731"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566735"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566737"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1579544"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1594627"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1609396"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632481"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632484"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632490"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1635045"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646555"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1649094"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1649101"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1651917"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1656187"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1656195"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1660423"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1660424"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1660425"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1660426"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1684381"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728484"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728488"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728490"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728492"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728494"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1757444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1757445"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1767748"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1800472"}],"affected":[{"package":{"name":"exiv2","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/exiv2?distro=rocky-linux-8-4-legacy&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.27.2-5.el8"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2020:1577.json"}},{"package":{"name":"gegl","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/gegl?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.2.0-39.el8"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2020:1577.json"}},{"package":{"name":"gnome-color-manager","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/gnome-color-manager?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.28.0-3.el8"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2020:1577.json"}},{"package":{"name":"libgexiv2","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/libgexiv2?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.10.8-4.el8"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2020:1577.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}