{
  "schema_version": "1.7.0",
  "id": "MGASA-2019-0415",
  "published": "2019-12-31T16:51:17Z",
  "modified": "2019-12-31T16:31:11Z",
  "summary": "Updated exiv2 packages fix security vulnerabilities",
  "details": "The updated packages fix security vulnerabilities:\n\nAn integer overflow in Exiv2 through 0.27.1 allows an attacker to cause\na denial of service (SIGSEGV) via a crafted PNG image file, because \nPngImage::readMetadata mishandles a zero value for iccOffset.\n(CVE-2019-13108)\n\nAn integer overflow in Exiv2 through 0.27.1 allows an attacker to cause\na denial of service (SIGSEGV) via a crafted PNG image file, because\nPngImage::readMetadata mishandles a chunkLength - iccOffset subtraction.\n(CVE-2019-13109)\n\nA CiffDirectory::readDirectory integer overflow and out-of-bounds read\nin Exiv2 through 0.27.1 allows an attacker to cause a denial of service\n(SIGSEGV) via a crafted CRW image file. (CVE-2019-13110)\n\nA PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2\nthrough 0.27.1 allows an attacker to cause a denial of service (crash\ndue to an std::bad_alloc exception) via a crafted PNG image file.\n(CVE-2019-13112)\n\nExiv2 through 0.27.1 allows an attacker to cause a denial of service\n(crash due to assertion failure) via an invalid data location in a\nCRW image file. (CVE-2019-13113)\n\nhttp.c in Exiv2 through 0.27.1 allows a malicious http server to cause a\ndenial of service (crash due to a NULL pointer dereference) by returning\na crafted response that lacks a space character. (CVE-2019-13114)\n\nExiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in\ntypes.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory\nin crwimage_int.cpp, because there is no validation of the relationship\nof the total size to the offset and size. (CVE-2019-17402)\n",
  "upstream": [
    "CVE-2019-13108",
    "CVE-2019-13109",
    "CVE-2019-13110",
    "CVE-2019-13112",
    "CVE-2019-13113",
    "CVE-2019-13114",
    "CVE-2019-17402"
  ],
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://advisories.mageia.org/MGASA-2019-0415.html"
    },
    {
      "type": "REPORT",
      "url": "https://bugs.mageia.org/show_bug.cgi?id=25280"
    },
    {
      "type": "WEB",
      "url": "https://usn.ubuntu.com/4056-1/"
    },
    {
      "type": "WEB",
      "url": "https://usn.ubuntu.com/4159-1/"
    }
  ],
  "affected": [
    {
      "package": {
        "ecosystem": "Mageia:7",
        "name": "exiv2",
        "purl": "pkg:rpm/mageia/exiv2?arch=source&distro=mageia-7"
      },
      "ranges": [
        {
          "type": "ECOSYSTEM",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0.27.1-3.2.mga7"
            }
          ]
        }
      ],
      "ecosystem_specific": {
        "section": "core"
      }
    }
  ],
  "credits": [
    {
      "name": "Mageia",
      "type": "COORDINATOR",
      "contact": [
        "https://wiki.mageia.org/en/Packages_Security_Team"
      ]
    }
  ]
}
