[ubuntu/trusty-security] exempi 2.2.1-1ubuntu1.1 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Mon Jun 4 12:43:54 UTC 2018
exempi (2.2.1-1ubuntu1.1) trusty-security; urgency=medium
* SECURITY UPDATE: integer overflow in RIFF.cpp
- debian/patches/CVE-2017-18233.patch: fix overflow in
source/XMPFiles/FormatSupport/RIFF.cpp.
- CVE-2017-18233
* SECURITY UPDATE: DoS via pdf file with JPEG data
- debian/patches/CVE-2017-18234.patch: fix error handling and replace
memcpy in public/include/XMP_Const.h,
public/include/client-glue/WXMP_Common.hpp,
source/XMPFiles/FormatSupport/TIFF_MemoryReader.cpp,
source/XMPFiles/FormatSupport/TIFF_Support.hpp,
source/common/XMP_LibUtils.hpp.
- Thanks to Debian for the backport!
- CVE-2017-18234
* SECURITY UPDATE: infinite loop via a crafted asf file
- debian/patches/CVE-2017-18236.patch: check size in
source/XMPFiles/FormatSupport/ASF_Support.cpp.
- CVE-2017-18236
* SECURITY UPDATE: infinite loop via XMP data in qt file
- debian/patches/CVE-2017-18238.patch: exit loop in
source/XMPFiles/FormatSupport/QuickTime_Support.cpp.
- CVE-2017-18238
* SECURITY UPDATE: heap-based buffer over-read in the MD5Update()
- debian/patches/CVE-2018-7728.patch: check dataLen in
source/XMPFiles/FileHandlers/TIFF_Handler.cpp.
- CVE-2018-7728
* SECURITY UPDATE: buffer over-read in CacheFileData()
- debian/patches/CVE-2018-7730.patch: check dataLen in
source/XMPFiles/FormatSupport/PSIR_FileWriter.cpp.
- CVE-2018-7730
Date: 2018-06-01 17:54:35.289709+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/exempi/2.2.1-1ubuntu1.1
-------------- next part --------------
Sorry, changesfile not available.
More information about the Trusty-changes
mailing list