[ubuntu/trusty-updates] exempi 2.2.1-1ubuntu1.1 (Accepted)

Ubuntu Archive Robot cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk
Mon Jun 4 13:58:09 UTC 2018


exempi (2.2.1-1ubuntu1.1) trusty-security; urgency=medium

  * SECURITY UPDATE: integer overflow in RIFF.cpp
    - debian/patches/CVE-2017-18233.patch: fix overflow in
      source/XMPFiles/FormatSupport/RIFF.cpp.
    - CVE-2017-18233
  * SECURITY UPDATE: DoS via pdf file with JPEG data
    - debian/patches/CVE-2017-18234.patch: fix error handling and replace
      memcpy in public/include/XMP_Const.h,
      public/include/client-glue/WXMP_Common.hpp,
      source/XMPFiles/FormatSupport/TIFF_MemoryReader.cpp,
      source/XMPFiles/FormatSupport/TIFF_Support.hpp,
      source/common/XMP_LibUtils.hpp.
    - Thanks to Debian for the backport!
    - CVE-2017-18234
  * SECURITY UPDATE: infinite loop via a crafted asf file
    - debian/patches/CVE-2017-18236.patch: check size in
      source/XMPFiles/FormatSupport/ASF_Support.cpp.
    - CVE-2017-18236
  * SECURITY UPDATE: infinite loop via XMP data in qt file
    - debian/patches/CVE-2017-18238.patch: exit loop in
      source/XMPFiles/FormatSupport/QuickTime_Support.cpp.
    - CVE-2017-18238
  * SECURITY UPDATE: heap-based buffer over-read in the MD5Update()
    - debian/patches/CVE-2018-7728.patch: check dataLen in
      source/XMPFiles/FileHandlers/TIFF_Handler.cpp.
    - CVE-2018-7728
  * SECURITY UPDATE: buffer over-read in CacheFileData()
    - debian/patches/CVE-2018-7730.patch: check dataLen in
      source/XMPFiles/FormatSupport/PSIR_FileWriter.cpp.
    - CVE-2018-7730

Date: 2018-06-01 17:54:35.289709+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
Signed-By: Ubuntu Archive Robot <cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/exempi/2.2.1-1ubuntu1.1
-------------- next part --------------
Sorry, changesfile not available.


More information about the Trusty-changes mailing list