Bug 1189332 (CVE-2021-37620) - VUL-1: CVE-2021-37620: exiv2: exiv2: out-of-bounds read in XmpTextValue:read()
Summary: VUL-1: CVE-2021-37620: exiv2: exiv2: out-of-bounds read in XmpTextValue:read()
Status: RESOLVED FIXED
Alias: CVE-2021-37620
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/306093/
Whiteboard: CVSSv3.1:SUSE:CVE-2021-37620:3.1:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2021-08-11 14:53 UTC by Gabriele Sonnu
Modified: 2024-05-16 14:43 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Gabriele Sonnu 2021-08-11 14:53:00 UTC
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.5.

Reference:
https://github.com/Exiv2/exiv2/security/advisories/GHSA-v5g7-46xf-h728

Upstream patch:
https://github.com/Exiv2/exiv2/pull/1769

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1992180
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37620
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37620
https://github.com/Exiv2/exiv2/pull/1769
https://github.com/Exiv2/exiv2/security/advisories/GHSA-v5g7-46xf-h728
Comment 1 Gabriele Sonnu 2021-08-11 14:54:56 UTC
Affected Packages:
- SUSE:SLE-11:Update/exiv2  0.17.1
- SUSE:SLE-12:Update/exiv2  0.23
- SUSE:SLE-15:Update/exiv2  0.26
- openSUSE:Factory/exiv2    0.27.4

The patch [0] contains both the fix and some defensive programming for similar code. The fix for the CVE is found in this commit [1]

[0]
https://github.com/Exiv2/exiv2/pull/1769

[1]
https://github.com/Exiv2/exiv2/pull/1769/commits/2e7bb581a234bfb0d0c9e16a1dbf037a8c30681e
Comment 6 OBSbugzilla Bot 2022-09-28 16:05:15 UTC
This is an autogenerated message for OBS integration:
This bug (1189332) was mentioned in
https://build.opensuse.org/request/show/1006717 Factory / exiv2
Comment 9 Swamp Workflow Management 2022-10-17 16:34:31 UTC
SUSE-SU-2022:3598-1: An update that fixes 15 vulnerabilities is now available.

Category: security (important)
Bug References: 1076579,1086798,1086810,1092096,1114690,1185447,1186192,1188733,1188756,1189330,1189331,1189332,1189333,1189636,1189780
CVE References: CVE-2018-10772,CVE-2018-18915,CVE-2018-5772,CVE-2018-8976,CVE-2018-8977,CVE-2020-18898,CVE-2020-18899,CVE-2021-29470,CVE-2021-31291,CVE-2021-31292,CVE-2021-32617,CVE-2021-37618,CVE-2021-37619,CVE-2021-37620,CVE-2021-37621
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    exiv2-0.26-150000.6.16.1
openSUSE Leap 15.3 (src):    exiv2-0.26-150000.6.16.1
SUSE Manager Server 4.1 (src):    exiv2-0.26-150000.6.16.1
SUSE Manager Retail Branch Server 4.1 (src):    exiv2-0.26-150000.6.16.1
SUSE Manager Proxy 4.1 (src):    exiv2-0.26-150000.6.16.1
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    exiv2-0.26-150000.6.16.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    exiv2-0.26-150000.6.16.1
SUSE Linux Enterprise Server for SAP 15 (src):    exiv2-0.26-150000.6.16.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    exiv2-0.26-150000.6.16.1
SUSE Linux Enterprise Server 15-SP2-BCL (src):    exiv2-0.26-150000.6.16.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    exiv2-0.26-150000.6.16.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    exiv2-0.26-150000.6.16.1
SUSE Linux Enterprise Server 15-LTSS (src):    exiv2-0.26-150000.6.16.1
SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (src):    exiv2-0.26-150000.6.16.1
SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (src):    exiv2-0.26-150000.6.16.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    exiv2-0.26-150000.6.16.1
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    exiv2-0.26-150000.6.16.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    exiv2-0.26-150000.6.16.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    exiv2-0.26-150000.6.16.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    exiv2-0.26-150000.6.16.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    exiv2-0.26-150000.6.16.1
SUSE Enterprise Storage 7 (src):    exiv2-0.26-150000.6.16.1
SUSE Enterprise Storage 6 (src):    exiv2-0.26-150000.6.16.1
SUSE CaaS Platform 4.0 (src):    exiv2-0.26-150000.6.16.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Swamp Workflow Management 2022-11-07 20:22:41 UTC
SUSE-SU-2022:3889-1: An update that solves 15 vulnerabilities, contains one feature and has one errata is now available.

Category: security (important)
Bug References: 1068871,1142675,1142679,1185002,1185218,1185447,1185913,1186053,1186192,1188645,1188733,1189332,1189333,1189334,1189335,1189338
CVE References: CVE-2017-1000128,CVE-2019-13108,CVE-2019-13111,CVE-2020-19716,CVE-2021-29457,CVE-2021-29463,CVE-2021-29470,CVE-2021-29623,CVE-2021-31291,CVE-2021-32617,CVE-2021-34334,CVE-2021-37620,CVE-2021-37621,CVE-2021-37622,CVE-2021-37623
JIRA References: PED-1393
Sources used:
openSUSE Leap 15.4 (src):    exiv2-0.27.5-150400.15.4.1, exiv2-0_26-0.26-150400.9.16.1
SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (src):    exiv2-0.27.5-150400.15.4.1, exiv2-0_26-0.26-150400.9.16.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Dirk Mueller 2022-11-14 12:18:49 UTC
this has been submitted for SLE12. as it is rated as CVSSv3 3.1, I am skipping the SLE11 backport.
Comment 15 Swamp Workflow Management 2022-11-28 14:38:11 UTC
SUSE-SU-2022:4252-1: An update that fixes 8 vulnerabilities is now available.

Category: security (important)
Bug References: 1119562,1142681,1185002,1186231,1188733,1189332,1189337,1189338
CVE References: CVE-2018-20097,CVE-2019-13112,CVE-2021-29457,CVE-2021-29473,CVE-2021-31291,CVE-2021-32815,CVE-2021-34334,CVE-2021-37620
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    exiv2-0.23-12.18.1
SUSE OpenStack Cloud 9 (src):    exiv2-0.23-12.18.1
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    exiv2-0.23-12.18.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    exiv2-0.23-12.18.1
SUSE Linux Enterprise Server 12-SP5 (src):    exiv2-0.23-12.18.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    exiv2-0.23-12.18.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    exiv2-0.23-12.18.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    exiv2-0.23-12.18.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.