QID 671049

Date Published: 2021-11-29

QID 671049: EulerOS Security Update for exiv2 (EulerOS-SA-2021-2628)

A command line utility to access image metadata, allowing one to: * print the exif metadata of jpeg images as summary info, interpreted values,or the plain data for each tag * print the iptc metadata of jpeg images * print the jpeg comment of jpeg images * set, add and delete exif and iptc metadata of jpeg images * adjust the exif timestamp (thats how it all started...) * rename exif image files according to the exif timestamp * extract, insert and delete exif metadata (including thumbnails),iptc metadata and jpeg comments security fix(es): exiv2 is a command-line utility and c++ library for reading, writing, deleting, and modifying the metadata of image files.
An out-of-bounds read was found in exiv2 versions v0.27.4 and earlier.
The out-of-bounds read is triggered when exiv2 is used to write metadata into a crafted image file.
An attacker could potentially exploit the vulnerability to cause a denial of service by crashing exiv2, if they can trick the victim into running exiv2 on a crafted image file.(cve-2021-37619) exiv2 is a command-line utility and c++ library for reading, writing, deleting, and modifying the metadata of image files.
The out-of-bounds read is triggered when exiv2 is used to print the metadata of a crafted image file.
An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running exiv2 on a crafted image file.(cve-2021-37618) exiv2 is a command-line utility and c++ library for reading, writing, deleting, and modifying the metadata of image files.
An infinite loop was found in exiv2 versions v0.27.4 and earlier.
The infinite loop is triggered when exiv2 is used to modify the metadata of a crafted image file.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

An arbitrary attacker may exploit this vulnerability to compromise the system.

  • CVSS V3 rated as Critical - 8.1 severity.
  • CVSS V2 rated as Medium - 5.8 severity.
  • Solution
    The Vendor has released a security update to fix the vulnerability. For more information please visit EulerOS-SA-2021-2628 for updates and patch information
    Software Advisories
    Advisory ID Software Component Link
    EulerOS-SA-2021-2628 EulerOS V2.0SP8 URL Logo developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-2628