RedHat: RHSA-2019-2048:01 Low: exempi security update
Summary
Exempi provides a library for easy parsing of XMP metadata. It is a port of
Adobe XMP SDK to work on UNIX and to be build with GNU automake. It
includes XMPCore and XMPFiles.
Security Fix(es):
* exempi: Infinite Loop in Chunk class in
XMPFiles/source/FormatSupport/RIFF.cpp (CVE-2017-18233)
* exempi: Use after free via a PDF file containing JPEG data
(CVE-2017-18234)
* exempi: Infinite loop in ASF_Support::ReadHeaderObject function in
XMPFiles/source/FormatSupport/ASF_Support.cpp (CVE-2017-18236)
* exempi: Infinite loop in TradQT_Manager::ParseCachedBoxes function in
XMPFiles/source/FormatSupport/QuickTime_Support.cpp (CVE-2017-18238)
* exempi: Heap-based buffer overflow in PSD_MetaHandler::CacheFileData
function in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp allows for
denial of service via crafted XLS file (CVE-2018-7730)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.7 Release Notes linked from the References section.
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
References
https://access.redhat.com/security/cve/CVE-2017-18233 https://access.redhat.com/security/cve/CVE-2017-18234 https://access.redhat.com/security/cve/CVE-2017-18236 https://access.redhat.com/security/cve/CVE-2017-18238 https://access.redhat.com/security/cve/CVE-2018-7730 https://access.redhat.com/security/updates/classification/#low https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html-single/7.7_release_notes/index
Package List
Red Hat Enterprise Linux Client (v. 7):
Source:
exempi-2.2.0-9.el7.src.rpm
x86_64:
exempi-2.2.0-9.el7.i686.rpm
exempi-2.2.0-9.el7.x86_64.rpm
exempi-debuginfo-2.2.0-9.el7.i686.rpm
exempi-debuginfo-2.2.0-9.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
exempi-debuginfo-2.2.0-9.el7.i686.rpm
exempi-debuginfo-2.2.0-9.el7.x86_64.rpm
exempi-devel-2.2.0-9.el7.i686.rpm
exempi-devel-2.2.0-9.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
Source:
exempi-2.2.0-9.el7.src.rpm
x86_64:
exempi-2.2.0-9.el7.i686.rpm
exempi-2.2.0-9.el7.x86_64.rpm
exempi-debuginfo-2.2.0-9.el7.i686.rpm
exempi-debuginfo-2.2.0-9.el7.x86_64.rpm
exempi-devel-2.2.0-9.el7.i686.rpm
exempi-devel-2.2.0-9.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
exempi-2.2.0-9.el7.src.rpm
ppc64:
exempi-2.2.0-9.el7.ppc.rpm
exempi-2.2.0-9.el7.ppc64.rpm
exempi-debuginfo-2.2.0-9.el7.ppc.rpm
exempi-debuginfo-2.2.0-9.el7.ppc64.rpm
ppc64le:
exempi-2.2.0-9.el7.ppc64le.rpm
exempi-debuginfo-2.2.0-9.el7.ppc64le.rpm
s390x:
exempi-2.2.0-9.el7.s390.rpm
exempi-2.2.0-9.el7.s390x.rpm
exempi-debuginfo-2.2.0-9.el7.s390.rpm
exempi-debuginfo-2.2.0-9.el7.s390x.rpm
x86_64:
exempi-2.2.0-9.el7.i686.rpm
exempi-2.2.0-9.el7.x86_64.rpm
exempi-debuginfo-2.2.0-9.el7.i686.rpm
exempi-debuginfo-2.2.0-9.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
exempi-debuginfo-2.2.0-9.el7.ppc.rpm
exempi-debuginfo-2.2.0-9.el7.ppc64.rpm
exempi-devel-2.2.0-9.el7.ppc.rpm
exempi-devel-2.2.0-9.el7.ppc64.rpm
ppc64le:
exempi-debuginfo-2.2.0-9.el7.ppc64le.rpm
exempi-devel-2.2.0-9.el7.ppc64le.rpm
s390x:
exempi-debuginfo-2.2.0-9.el7.s390.rpm
exempi-debuginfo-2.2.0-9.el7.s390x.rpm
exempi-devel-2.2.0-9.el7.s390.rpm
exempi-devel-2.2.0-9.el7.s390x.rpm
x86_64:
exempi-debuginfo-2.2.0-9.el7.i686.rpm
exempi-debuginfo-2.2.0-9.el7.x86_64.rpm
exempi-devel-2.2.0-9.el7.i686.rpm
exempi-devel-2.2.0-9.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
exempi-2.2.0-9.el7.src.rpm
x86_64:
exempi-2.2.0-9.el7.i686.rpm
exempi-2.2.0-9.el7.x86_64.rpm
exempi-debuginfo-2.2.0-9.el7.i686.rpm
exempi-debuginfo-2.2.0-9.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
exempi-debuginfo-2.2.0-9.el7.i686.rpm
exempi-debuginfo-2.2.0-9.el7.x86_64.rpm
exempi-devel-2.2.0-9.el7.i686.rpm
exempi-devel-2.2.0-9.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for exempi is now available for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impactof Low. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
Bugs Fixed
1555163 - CVE-2018-7730 exempi: Heap-based buffer overflow in PSD_MetaHandler::CacheFileData function in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp allows for denial of service via crafted XLS file
1558715 - CVE-2017-18238 exempi: Infinite loop in TradQT_Manager::ParseCachedBoxes function in XMPFiles/source/FormatSupport/QuickTime_Support.cpp
1559575 - CVE-2017-18233 exempi: Infinite Loop in Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp
1559590 - CVE-2017-18234 exempi: Use after free via a PDF file containing JPEG data
1559596 - CVE-2017-18236 exempi: Infinite loop in ASF_Support::ReadHeaderObject function in XMPFiles/source/FormatSupport/ASF_Support.cpp