ALT-PU-2021-3308-1
Closed vulnerabilities
BDU:2021-05214
Уязвимость функции Jp2Image::readMetadata() компонента jp2image.cpp библиотеки для управления метаданными медиафайлов Exiv2, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2021-05234
Уязвимость библиотеки для управления метаданными медиафайлов Exiv2, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05244
Уязвимость библиотеки для управления метаданными медиафайлов Exiv2, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05262
Уязвимость функции CrwMap::encode библиотеки для управления метаданными медиафайлов Exiv2, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-29457
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4.
- https://github.com/Exiv2/exiv2/issues/1529
- https://github.com/Exiv2/exiv2/issues/1529
- https://github.com/Exiv2/exiv2/pull/1534
- https://github.com/Exiv2/exiv2/pull/1534
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-v74w-h496-cgqm
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-v74w-h496-cgqm
- [debian-lts-announce] 20210830 [SECURITY] [DLA 2750-1] exiv2 security update
- [debian-lts-announce] 20210830 [SECURITY] [DLA 2750-1] exiv2 security update
- FEDORA-2021-10d7331a31
- FEDORA-2021-10d7331a31
- FEDORA-2021-be94728b95
- FEDORA-2021-be94728b95
- GLSA-202312-06
- GLSA-202312-06
- DSA-4958
- DSA-4958
Modified: 2024-11-21
CVE-2021-29473
Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security.
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-7569-phvm-vwc2
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-7569-phvm-vwc2
- https://github.com/Exiv2/exiv2/security/policy
- https://github.com/Exiv2/exiv2/security/policy
- https://github.com/github/advisory-review/pull/1587
- https://github.com/github/advisory-review/pull/1587
- [debian-lts-announce] 20210830 [SECURITY] [DLA 2750-1] exiv2 security update
- [debian-lts-announce] 20210830 [SECURITY] [DLA 2750-1] exiv2 security update
- FEDORA-2021-10d7331a31
- FEDORA-2021-10d7331a31
- FEDORA-2021-2d860da728
- FEDORA-2021-2d860da728
- FEDORA-2021-96a5dabcfa
- FEDORA-2021-96a5dabcfa
- FEDORA-2021-be94728b95
- FEDORA-2021-be94728b95
- GLSA-202312-06
- GLSA-202312-06
- DSA-4958
- DSA-4958
Modified: 2024-11-21
CVE-2021-31292
An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based buffer overflow and cause a denial of service (DOS) via crafted metadata.
- https://github.com/Exiv2/exiv2/issues/1530
- https://github.com/Exiv2/exiv2/issues/1530
- [debian-lts-announce] 20210830 [SECURITY] [DLA 2750-1] exiv2 security update
- [debian-lts-announce] 20210830 [SECURITY] [DLA 2750-1] exiv2 security update
- FEDORA-2021-399f869889
- FEDORA-2021-399f869889
- FEDORA-2021-cbaef8e2d5
- FEDORA-2021-cbaef8e2d5
- GLSA-202312-06
- GLSA-202312-06
- DSA-4958
- DSA-4958
Modified: 2024-11-21
CVE-2021-3482
A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data.
- https://bugzilla.redhat.com/show_bug.cgi?id=1946314
- https://bugzilla.redhat.com/show_bug.cgi?id=1946314
- [debian-lts-announce] 20210830 [SECURITY] [DLA 2750-1] exiv2 security update
- [debian-lts-announce] 20210830 [SECURITY] [DLA 2750-1] exiv2 security update
- FEDORA-2021-10d7331a31
- FEDORA-2021-10d7331a31
- FEDORA-2021-be94728b95
- FEDORA-2021-be94728b95
- DSA-4958
- DSA-4958