Bug 1189332 - (CVE-2021-37620) VUL-1: CVE-2021-37620: exiv2: exiv2: out-of-bounds read in XmpTextValue:read()
(CVE-2021-37620)
VUL-1: CVE-2021-37620: exiv2: exiv2: out-of-bounds read in XmpTextValue:read()
Status: NEW
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P4 - Low : Minor
: ---
Assigned To: Dirk Mueller
Security Team bot
https://smash.suse.de/issue/306093/
CVSSv3.1:SUSE:CVE-2021-37620:3.1:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-08-11 14:53 UTC by Gabriele Sonnu
Modified: 2021-08-12 07:54 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Gabriele Sonnu 2021-08-11 14:53:00 UTC
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.5.

Reference:
https://github.com/Exiv2/exiv2/security/advisories/GHSA-v5g7-46xf-h728

Upstream patch:
https://github.com/Exiv2/exiv2/pull/1769

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1992180
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37620
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37620
https://github.com/Exiv2/exiv2/pull/1769
https://github.com/Exiv2/exiv2/security/advisories/GHSA-v5g7-46xf-h728
Comment 1 Gabriele Sonnu 2021-08-11 14:54:56 UTC
Affected Packages:
- SUSE:SLE-11:Update/exiv2  0.17.1
- SUSE:SLE-12:Update/exiv2  0.23
- SUSE:SLE-15:Update/exiv2  0.26
- openSUSE:Factory/exiv2    0.27.4

The patch [0] contains both the fix and some defensive programming for similar code. The fix for the CVE is found in this commit [1]

[0]
https://github.com/Exiv2/exiv2/pull/1769

[1]
https://github.com/Exiv2/exiv2/pull/1769/commits/2e7bb581a234bfb0d0c9e16a1dbf037a8c30681e