7392 Security update for exiv2 moderate openSUSE Leap 42.3 Update This update for exiv2 fixes the following issues: Security issues fixed: - CVE-2017-11591: There is a Floating point exception in the Exiv2::ValueType function in Exiv2 0.26 that will lead to a remote denial of service attack via crafted input. (boo#1050257) - CVE-2017-11683: There is a reachable assertion in the Internal::TiffReader::visitDirectory function in tiffvisitor.cpp of Exiv2 0.26 that will lead to a remote denial of service attack via crafted input. (boo#1051188) - CVE-2017-14865: There is a heap-based buffer overflow in the Exiv2::us2Data function of types.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack. (boo#1061003) - CVE-2017-14862: An Invalid memory address dereference was discovered in Exiv2::DataValue::read in value.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service. (boo#1060996) - CVE-2017-14859: An Invalid memory address dereference was discovered in Exiv2::StringValueBase::read in value.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service. (boo#1061000) exiv2-0.25-10.1.i586.rpm exiv2-0.25-10.1.src.rpm exiv2-debuginfo-0.25-10.1.i586.rpm exiv2-debugsource-0.25-10.1.i586.rpm exiv2-lang-0.25-10.1.noarch.rpm libexiv2-14-0.25-10.1.i586.rpm libexiv2-14-32bit-0.25-10.1.x86_64.rpm libexiv2-14-debuginfo-0.25-10.1.i586.rpm libexiv2-14-debuginfo-32bit-0.25-10.1.x86_64.rpm libexiv2-devel-0.25-10.1.i586.rpm exiv2-0.25-10.1.x86_64.rpm exiv2-debuginfo-0.25-10.1.x86_64.rpm exiv2-debugsource-0.25-10.1.x86_64.rpm libexiv2-14-0.25-10.1.x86_64.rpm libexiv2-14-debuginfo-0.25-10.1.x86_64.rpm libexiv2-devel-0.25-10.1.x86_64.rpm