[ubuntu/xenial-updates] exempi 2.2.2-2ubuntu0.1 (Accepted)
Ubuntu Archive Robot
cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk
Mon Jun 4 13:58:09 UTC 2018
exempi (2.2.2-2ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: integer overflow in RIFF.cpp
- debian/patches/CVE-2017-18233.patch: fix overflow in
source/XMPFiles/FormatSupport/RIFF.cpp.
- CVE-2017-18233
* SECURITY UPDATE: DoS via pdf file with JPEG data
- debian/patches/CVE-2017-18234.patch: fix error handling and replace
memcpy in public/include/XMP_Const.h,
public/include/client-glue/WXMP_Common.hpp,
source/XMPFiles/FormatSupport/TIFF_MemoryReader.cpp,
source/XMPFiles/FormatSupport/TIFF_Support.hpp,
source/common/XMP_LibUtils.hpp.
- Thanks to Debian for the backport!
- CVE-2017-18234
* SECURITY UPDATE: infinite loop via a crafted asf file
- debian/patches/CVE-2017-18236.patch: check size in
source/XMPFiles/FormatSupport/ASF_Support.cpp.
- CVE-2017-18236
* SECURITY UPDATE: infinite loop via XMP data in qt file
- debian/patches/CVE-2017-18238.patch: exit loop in
source/XMPFiles/FormatSupport/QuickTime_Support.cpp.
- CVE-2017-18238
* SECURITY UPDATE: heap-based buffer over-read in the MD5Update()
- debian/patches/CVE-2018-7728.patch: check dataLen in
source/XMPFiles/FileHandlers/TIFF_Handler.cpp.
- CVE-2018-7728
* SECURITY UPDATE: buffer over-read in CacheFileData()
- debian/patches/CVE-2018-7730.patch: check dataLen in
source/XMPFiles/FormatSupport/PSIR_FileWriter.cpp.
- CVE-2018-7730
Date: 2018-06-01 17:54:32.221301+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
Signed-By: Ubuntu Archive Robot <cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/exempi/2.2.2-2ubuntu0.1
-------------- next part --------------
Sorry, changesfile not available.
More information about the Xenial-changes
mailing list