Bug 1545237 (CVE-2017-17724)
Summary: | CVE-2017-17724 exiv2: heap-buffer-overflow in Exiv2::IptcData::printStructure in src/iptc.cpp | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | jgrulich, michel, rdieter, rschiron |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
An integer underflow, leading to heap-based out-of-bound read, was found in the way Exiv2 library prints IPTC Photo Metadata embedded in an image. By persuading a victim to open a crafted image, a remote attacker could crash the application or possibly retrieve a portion of memory.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-08-06 19:18:22 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1545238, 1547658, 1547668, 1554414 | ||
Bug Blocks: | 1545252 |
Description
Laura Pardo
2018-02-14 13:03:21 UTC
Created exiv2 tracking bugs for this issue: Affects: fedora-all [bug 1545238] Introduced by: https://github.com/Exiv2/exiv2/commit/bdf8d3ad5b7275b10eef3a0e3a713859cb3f6c2f https://github.com/Exiv2/exiv2/commit/6e19d043efcf8425fdd08cd8a856d1c46528cf10 https://github.com/Exiv2/exiv2/commit/09c734fbcd98b3ae880a90d669569c95242f477e Statement: This issue did not affect the versions of Exiv2 as shipped with Red Hat Enterprise Linux 6 and 7 as they did not include support for printing IPTC Photo Metadata. *** Bug 1564284 has been marked as a duplicate of this bug. *** This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2101 https://access.redhat.com/errata/RHSA-2019:2101 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2017-17724 |