A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data.
{
"binaries": [
{
"binary_version": "0.25-2.1ubuntu16.04.7+esm1",
"binary_name": "exiv2"
},
{
"binary_version": "0.25-2.1ubuntu16.04.7+esm1",
"binary_name": "libexiv2-14"
},
{
"binary_version": "0.25-2.1ubuntu16.04.7+esm1",
"binary_name": "libexiv2-dev"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"binaries": [
{
"binary_version": "0.25-3.1ubuntu0.18.04.7",
"binary_name": "exiv2"
},
{
"binary_version": "0.25-3.1ubuntu0.18.04.7",
"binary_name": "libexiv2-14"
},
{
"binary_version": "0.25-3.1ubuntu0.18.04.7",
"binary_name": "libexiv2-dev"
}
],
"availability": "No subscription required"
}