Bug 425921 (CVE-2007-6353)
| Summary: | CVE-2007-6353 exiv2: integer overflow in EXIF parsing | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | rdieter |
| Target Milestone: | --- | Keywords: | Patch, Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6353 | ||
| Whiteboard: | |||
| Fixed In Version: | 0.15-5.fc7 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2007-12-20 20:10:42 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 425922, 425923, 425924, 425993, 426001 | ||
| Bug Blocks: | |||
|
Description
Tomas Hoger
2007-12-17 09:07:12 UTC
This is (apparently, can't see it yet), the upstream issue tracker: http://dev.robotbattle.com/bugs/view.php?id=534 (In reply to comment #1) > http://dev.robotbattle.com/bugs/view.php?id=534 Yes it is. That report was first opened as public and it also contained further details about similar problems in other EXIF parsing libraries (see e.g. our bugs #425551 and #425561 for libexif). Gentoo bug states that exiv2 did not compile because of incorrect static casts
used in the upstream patch. They've added extra correction:
diff -u exiv2-0.13/src/exif.cpp exiv2-0.13/src/exif.cpp
--- exiv2-0.13/src/exif.cpp
+++ exiv2-0.13/src/exif.cpp
@@ -244,7 +244,7 @@
uint32_t size = sizes->toLong(i);
lastSize = size;
if ( size > 0xffffffff - offset
- || static_cast(len) < offset + size) {
+ || static_cast<uint32_t>(len) < offset + size) {
return 2;
}
memcpy(stripsBuf.pData_ + currentOffset, buf + offset, size);
@@ -313,7 +313,7 @@
if (length == exifData.end()) return 1;
uint32_t size = length->toLong();
if ( size > 0xffffffff - offset
- || static_cast(len) < offset + size) {
+ || static_cast<uint32_t>(len) < offset + size) {
return 2;
}
format->setDataArea(buf + offset, size);
http://bugs.gentoo.org/show_bug.cgi?id=202351
Thanks. exiv2-0.15-5.fc7 has been pushed to the Fedora 7 stable repository. If problems still persist, please make note of it in this bug report. exiv2-0.15-5.fc8 has been pushed to the Fedora 8 stable repository. If problems still persist, please make note of it in this bug report. |