Bug 425993 - CVE-2007-6353 exiv2: integer overflow in EXIF parsing [EPEL-5]
Summary: CVE-2007-6353 exiv2: integer overflow in EXIF parsing [EPEL-5]
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Fedora EPEL
Classification: Fedora
Component: exiv2
Version: el5
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Rex Dieter
QA Contact: Fedora Extras Quality Assurance
URL: http://fedoraproject.org/wiki/Securit...
Whiteboard:
Depends On:
Blocks: CVE-2007-6353
TreeView+ depends on / blocked
 
Reported: 2007-12-17 17:04 UTC by Rex Dieter
Modified: 2008-02-18 14:50 UTC (History)
0 users

Fixed In Version: exiv2-0.15-5
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2008-02-18 14:50:50 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Rex Dieter 2007-12-17 17:04:55 UTC
+++ This bug was initially created as a clone of Bug #425922 +++

This is an automatically created tracking bug!

It was created to ensure that one or more security vulnerabilities are fixed in
all affected releases. You should not refer to it anywhere except in the update
system as it is a private "Fedora Project Contributors" bug. The update system
should close this bug it once the update is pushed.

For comments that are specific to a vulnerability please use bugs filed against
"Security Response" product referenced in "Blocks" field.

	bug #425921: CVE-2007-6353 exiv2: integer overflow in EXIF parsing

When creating an update for the version this this bug is reported against please
include the bug IDs of respective bugs filed against "Security Response" product
as well as of this bug. Please note that the update announcement will (and
should) contain only references to "Security Response" bugs as long as the
tracking bug is restricted to "Fedora Project Contributors".

For more information see: http://fedoraproject.org/wiki/Security/TrackingBugs

Comment 1 Rex Dieter 2007-12-17 17:08:38 UTC
ew, not sure if I cloned that right, this one doesn't seem to have any
restriction checkboxes like the others (see bug #425922)


Note You need to log in before you can comment on or make changes to this bug.