Ubuntu 4056-1: Exiv2 vulnerabilities

    Date 15 Jul 2019
    1195
    Posted By LinuxSecurity Advisories
    Several security issues were fixed in Exiv2.
    ==========================================================================
    Ubuntu Security Notice USN-4056-1
    July 15, 2019
    
    exiv2 vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 19.04
    - Ubuntu 18.10
    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    
    Summary:
    
    Several security issues were fixed in Exiv2.
    
    Software Description:
    - exiv2: EXIF/IPTC/XMP metadata manipulation tool
    
    Details:
    
    It was discovered that Exiv2 incorrectly handled certain PSD files.
    An attacker could possibly use this issue to cause a denial of service.
    (CVE-2018-19107, CVE-2018-19108)
    
    It was discovered that Exiv2 incorrectly handled certain PNG files.
    An attacker could possibly use this issue to cause a denial of service.
    (CVE-2018-19535, CVE-2019-13112)
    
    It was discovered that Exiv2 incorrectly handled certain CRW files.
    An attacker could possibly use this issue to cause a denial of service.
    (CVE-2019-13110, CVE-2019-13113)
    
    It was discovered that incorrectly handled certain HTTP requests.
    An attacker could possibly use this issue to cause a denial of service.
    (CVE-2019-13114)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 19.04:
      exiv2                           0.25-4ubuntu1.1
      libexiv2-14                     0.25-4ubuntu1.1
    
    Ubuntu 18.10:
      exiv2                           0.25-4ubuntu0.2
      libexiv2-14                     0.25-4ubuntu0.2
    
    Ubuntu 18.04 LTS:
      exiv2                           0.25-3.1ubuntu0.18.04.3
      libexiv2-14                     0.25-3.1ubuntu0.18.04.3
    
    Ubuntu 16.04 LTS:
      exiv2                           0.25-2.1ubuntu16.04.4
      libexiv2-14                     0.25-2.1ubuntu16.04.4
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      https://usn.ubuntu.com/4056-1
      CVE-2018-19107, CVE-2018-19108, CVE-2018-19535, CVE-2019-13110,
      CVE-2019-13112, CVE-2019-13113, CVE-2019-13114
    
    Package Information:
      https://launchpad.net/ubuntu/+source/exiv2/0.25-4ubuntu1.1
      https://launchpad.net/ubuntu/+source/exiv2/0.25-4ubuntu0.2
      https://launchpad.net/ubuntu/+source/exiv2/0.25-3.1ubuntu0.18.04.3
      https://launchpad.net/ubuntu/+source/exiv2/0.25-2.1ubuntu16.04.4
    

    LinuxSecurity Poll

    Are you considering making the switch to Purism's new Librem 14 Linux laptop to improve your security and privacy online?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/31-are-you-considering-making-the-switch-to-purism-s-new-librem-14-linux-laptop-to-improve-your-security-and-privacy-online?task=poll.vote&format=json
    31
    radio
    [{"id":"109","title":"Yes - the hardware kill switches and default ad blocking\/tracking protection sold me on it.","votes":"2","type":"x","order":"1","pct":40,"resources":[]},{"id":"110","title":"Not sure yet - I need to do more research.","votes":"2","type":"x","order":"2","pct":40,"resources":[]},{"id":"111","title":"No - I'm satisfied with my current laptop and have no security\/privacy concerns.","votes":"1","type":"x","order":"3","pct":20,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.