Source: exiv2
Version: 0.27.3-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for exiv2.

CVE-2021-29464[0]:
| Exiv2 is a command-line utility and C++ library for reading, writing,
| deleting, and modifying the metadata of image files. A heap buffer
| overflow was found in Exiv2 versions v0.27.3 and earlier. The heap
| overflow is triggered when Exiv2 is used to write metadata into a
| crafted image file. An attacker could potentially exploit the
| vulnerability to gain code execution, if they can trick the victim
| into running Exiv2 on a crafted image file. Note that this bug is only
| triggered when writing the metadata, which is a less frequently used
| Exiv2 operation than reading the metadata. For example, to trigger the
| bug in the Exiv2 command-line application, you need to add an extra
| command-line argument such as `insert`. The bug is fixed in version
| v0.27.4.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-29464
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29464
[1] https://github.com/Exiv2/exiv2/security/advisories/GHSA-jgm9-5fw5-pw9p
[2] 
https://github.com/Exiv2/exiv2/commit/f9308839198aca5e68a65194f151a1de92398f54

Regards,
Salvatore

Reply via email to