A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "exiv2",
"binary_version": "0.25-2.1ubuntu16.04.7+esm1"
},
{
"binary_name": "libexiv2-14",
"binary_version": "0.25-2.1ubuntu16.04.7+esm1"
},
{
"binary_name": "libexiv2-dev",
"binary_version": "0.25-2.1ubuntu16.04.7+esm1"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "exiv2",
"binary_version": "0.25-3.1ubuntu0.18.04.7"
},
{
"binary_name": "libexiv2-14",
"binary_version": "0.25-3.1ubuntu0.18.04.7"
},
{
"binary_name": "libexiv2-dev",
"binary_version": "0.25-3.1ubuntu0.18.04.7"
}
]
}