Bug 1185002 - (CVE-2021-29457) VUL-0: CVE-2021-29457: exiv2: heap buffer overflow when write metadata into a crafted image file
(CVE-2021-29457)
VUL-0: CVE-2021-29457: exiv2: heap buffer overflow when write metadata into a...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Minor
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/282299/
CVSSv3.1:SUSE:CVE-2021-29457:7.8:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-04-20 07:14 UTC by Robert Frohl
Modified: 2022-11-28 14:37 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2021-04-20 07:14:21 UTC
CVE-2021-29457

Exiv2 is a command-line utility and C++ library for reading, writing, deleting,
and modifying the metadata of image files. A heap buffer overflow was found in
Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is
used to write metadata into a crafted image file. An attacker could potentially
exploit the vulnerability to gain code execution, if they can trick the victim
into running Exiv2 on a crafted image file. Note that this bug is only triggered
when _writing_ the metadata, which is a less frequently used Exiv2 operation
than _reading_ the metadata. For example, to trigger the bug in the Exiv2
command-line application, you need to add an extra command-line argument such as
`insert`. The bug is fixed in version v0.27.4.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-29457
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29457
https://github.com/Exiv2/exiv2/issues/1529
https://github.com/Exiv2/exiv2/pull/1534
https://github.com/Exiv2/exiv2/security/advisories/GHSA-v74w-h496-cgqm
Comment 1 Robert Frohl 2022-04-11 09:53:21 UTC
tracking as affected:

- SUSE:SLE-12:Update/exiv2
- SUSE:SLE-15:Update/exiv2
Comment 3 Thomas Leroy 2022-09-06 12:29:34 UTC
Any news Dirk?
Comment 4 Dirk Mueller 2022-09-27 20:20:49 UTC
I don't know what this is referring to. the fix that is linked was already fixed via https://bugzilla.suse.com/show_bug.cgi?id=1188733

both are talking about heap buffer overflow on *writing* and both link the same issue and same PR.
Comment 5 Thomas Leroy 2022-09-28 07:12:49 UTC
(In reply to Dirk Mueller from comment #4)
> I don't know what this is referring to. the fix that is linked was already
> fixed via https://bugzilla.suse.com/show_bug.cgi?id=1188733
> 
> both are talking about heap buffer overflow on *writing* and both link the
> same issue and same PR.

Thanks you very much for your efforts Dirk.
We indeed have 2 issues/CVEs for the same bug. Since this is already fixed by subs for bsc#1188733, we only miss the references of this CVE in the changelog. Could you please add this CVE/bsc (CVE-2021-29457/bsc#1185002) in the changes file? :)
Comment 6 Dirk Mueller 2022-09-28 10:03:01 UTC
IBS rq 281044 includes the updated references
Comment 9 OBSbugzilla Bot 2022-09-28 16:05:04 UTC
This is an autogenerated message for OBS integration:
This bug (1185002) was mentioned in
https://build.opensuse.org/request/show/1006717 Factory / exiv2
Comment 15 Swamp Workflow Management 2022-11-07 20:22:08 UTC
SUSE-SU-2022:3889-1: An update that solves 15 vulnerabilities, contains one feature and has one errata is now available.

Category: security (important)
Bug References: 1068871,1142675,1142679,1185002,1185218,1185447,1185913,1186053,1186192,1188645,1188733,1189332,1189333,1189334,1189335,1189338
CVE References: CVE-2017-1000128,CVE-2019-13108,CVE-2019-13111,CVE-2020-19716,CVE-2021-29457,CVE-2021-29463,CVE-2021-29470,CVE-2021-29623,CVE-2021-31291,CVE-2021-32617,CVE-2021-34334,CVE-2021-37620,CVE-2021-37621,CVE-2021-37622,CVE-2021-37623
JIRA References: PED-1393
Sources used:
openSUSE Leap 15.4 (src):    exiv2-0.27.5-150400.15.4.1, exiv2-0_26-0.26-150400.9.16.1
SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (src):    exiv2-0.27.5-150400.15.4.1, exiv2-0_26-0.26-150400.9.16.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 17 Swamp Workflow Management 2022-11-28 14:37:58 UTC
SUSE-SU-2022:4252-1: An update that fixes 8 vulnerabilities is now available.

Category: security (important)
Bug References: 1119562,1142681,1185002,1186231,1188733,1189332,1189337,1189338
CVE References: CVE-2018-20097,CVE-2019-13112,CVE-2021-29457,CVE-2021-29473,CVE-2021-31291,CVE-2021-32815,CVE-2021-34334,CVE-2021-37620
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    exiv2-0.23-12.18.1
SUSE OpenStack Cloud 9 (src):    exiv2-0.23-12.18.1
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    exiv2-0.23-12.18.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    exiv2-0.23-12.18.1
SUSE Linux Enterprise Server 12-SP5 (src):    exiv2-0.23-12.18.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    exiv2-0.23-12.18.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    exiv2-0.23-12.18.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    exiv2-0.23-12.18.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.