Bugzilla – Bug 1142675
VUL-1: CVE-2019-13108: exiv2: integer overflow PngImage:readMetadata leads to denial of service
Last modified: 2022-11-07 20:21:59 UTC
CVE-2019-13108 An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a zero value for iccOffset. Reference: https://github.com/Exiv2/exiv2/issues/789 https://github.com/Exiv2/exiv2/pull/794 References: https://bugzilla.redhat.com/show_bug.cgi?id=1728481 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13108 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-13108.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13108 http://www.cvedetails.com/cve/CVE-2019-13108/ https://github.com/Exiv2/exiv2/pull/794 https://github.com/Exiv2/exiv2/issues/789
This issue was introduced inhttps://github.com/kevinbackhouse/exiv2/commit/704fc56d52a981ba5945e79266bf3087e8861b3b which merged in 0.27-rc1. in SLE15 and older we're shipping 0.26 or older, so we're not affected.
added bugreference to factory changelog, closing
This is an autogenerated message for OBS integration: This bug (1142675) was mentioned in https://build.opensuse.org/request/show/1006717 Factory / exiv2
SUSE-SU-2022:3889-1: An update that solves 15 vulnerabilities, contains one feature and has one errata is now available. Category: security (important) Bug References: 1068871,1142675,1142679,1185002,1185218,1185447,1185913,1186053,1186192,1188645,1188733,1189332,1189333,1189334,1189335,1189338 CVE References: CVE-2017-1000128,CVE-2019-13108,CVE-2019-13111,CVE-2020-19716,CVE-2021-29457,CVE-2021-29463,CVE-2021-29470,CVE-2021-29623,CVE-2021-31291,CVE-2021-32617,CVE-2021-34334,CVE-2021-37620,CVE-2021-37621,CVE-2021-37622,CVE-2021-37623 JIRA References: PED-1393 Sources used: openSUSE Leap 15.4 (src): exiv2-0.27.5-150400.15.4.1, exiv2-0_26-0.26-150400.9.16.1 SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (src): exiv2-0.27.5-150400.15.4.1, exiv2-0_26-0.26-150400.9.16.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.