Hide Forgot
An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction. Reference: https://github.com/Exiv2/exiv2/issues/790 https://github.com/Exiv2/exiv2/pull/795
Created exiv2 tracking bugs for this issue: Affects: fedora-all [bug 1728485]
Upstream patches: https://github.com/Exiv2/exiv2/commit/491c3ebe3b3faa6d8f75fb28146186792c2439da [master branch] https://github.com/Exiv2/exiv2/commit/6fa2e31206127bd8bcac0269311f3775a8d6ea21 [0.27-maintenance branch]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:1577 https://access.redhat.com/errata/RHSA-2020:1577
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-13109