Bug 1992180 (CVE-2021-37620) - CVE-2021-37620 exiv2: out-of-bounds read in XmpTextValue::read()
Summary: CVE-2021-37620 exiv2: out-of-bounds read in XmpTextValue::read()
Keywords:
Status: NEW
Alias: CVE-2021-37620
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1992181 1992182 1995780 1995781 1995782
Blocks: 1992216
TreeView+ depends on / blocked
 
Reported: 2021-08-10 17:37 UTC by Guilherme de Almeida Suckevicz
Modified: 2021-08-20 18:14 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2021-08-10 17:37:31 UTC
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.5.

Reference:
https://github.com/Exiv2/exiv2/security/advisories/GHSA-v5g7-46xf-h728

Upstream patch:
https://github.com/Exiv2/exiv2/pull/1769

Comment 1 Guilherme de Almeida Suckevicz 2021-08-10 17:37:51 UTC
Created exiv2 tracking bugs for this issue:

Affects: fedora-all [bug 1992182]


Created mingw-exiv2 tracking bugs for this issue:

Affects: fedora-all [bug 1992181]


Note You need to log in before you can comment on or make changes to this bug.