{"affected":[{"ecosystem_specific":{"binaries":[{"libexiv2-26":"0.26-150400.9.21.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Desktop Applications 15 SP4","name":"exiv2-0_26","purl":"pkg:rpm/suse/exiv2-0_26&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.26-150400.9.21.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libexiv2-26":"0.26-150400.9.21.1","libexiv2-26-32bit":"0.26-150400.9.21.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.4","name":"exiv2-0_26","purl":"pkg:rpm/opensuse/exiv2-0_26&distro=openSUSE%20Leap%2015.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.26-150400.9.21.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for exiv2-0_26 fixes the following issues:\n\n- CVE-2019-17402: Fixed improper validation of the total size to the offset and size leads to a crash in Exiv2::getULong in types.cpp (bsc#1153577).\n- CVE-2018-20098: Fixed a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header (bsc#1119560).\n- CVE-2018-17581: Fixed an excessive stack consumption CiffDirectory:readDirectory() at crwimage_int.cpp (bsc#1110282).\n- CVE-2018-20099: exiv2: infinite loop in Exiv2::Jp2Image::encodeJp2Header (bsc#1119559).\n- CVE-2018-20097: Fixed SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroupsu (bsc#1119562).\n- CVE-2017-11591: Fixed a floating point exception in Exiv2::ValueType (bsc#1050257).\n- CVE-2018-11531: Fixed a heap-based buffer overflow in getData in preview.cpp (bsc#1095070).\n- CVE-2021-32815: Fixed a deny-of-service due to assertion failure in crwimage_int.cpp (bsc#1189337).\n- CVE-2021-29473: Fixed out-of-bounds read in Exiv2::Jp2Image:doWriteMetadata (bsc#1186231).\n- CVE-2019-13109: Fixed a denial of service in PngImage:readMetadata (bsc#1142677).\n- CVE-2019-13110: Fixed an integer-overflow and out-of-bounds read in CiffDirectory:readDirectory leads to denail of service (bsc#1142678).\n","id":"SUSE-SU-2022:4208-1","modified":"2022-11-23T16:36:27Z","published":"2022-11-23T16:36:27Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20224208-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1050257"},{"type":"REPORT","url":"https://bugzilla.suse.com/1095070"},{"type":"REPORT","url":"https://bugzilla.suse.com/1110282"},{"type":"REPORT","url":"https://bugzilla.suse.com/1119559"},{"type":"REPORT","url":"https://bugzilla.suse.com/1119560"},{"type":"REPORT","url":"https://bugzilla.suse.com/1119562"},{"type":"REPORT","url":"https://bugzilla.suse.com/1142677"},{"type":"REPORT","url":"https://bugzilla.suse.com/1142678"},{"type":"REPORT","url":"https://bugzilla.suse.com/1153577"},{"type":"REPORT","url":"https://bugzilla.suse.com/1186231"},{"type":"REPORT","url":"https://bugzilla.suse.com/1189337"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-11591"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-11531"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-17581"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-20097"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-20098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-20099"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13109"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13110"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-17402"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-29473"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-32815"}],"related":["CVE-2017-11591","CVE-2018-11531","CVE-2018-17581","CVE-2018-20097","CVE-2018-20098","CVE-2018-20099","CVE-2019-13109","CVE-2019-13110","CVE-2019-17402","CVE-2021-29473","CVE-2021-32815"],"summary":"Security update for exiv2-0_26","upstream":["CVE-2017-11591","CVE-2018-11531","CVE-2018-17581","CVE-2018-20097","CVE-2018-20098","CVE-2018-20099","CVE-2019-13109","CVE-2019-13110","CVE-2019-17402","CVE-2021-29473","CVE-2021-32815"]}