8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
High
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.011 Low
EPSS
Percentile
84.0%
The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments.
The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917)
Security Fix(es):
exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421)
exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005)
exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868)
exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303)
exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304)
exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305)
exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772)
exiv2: information leak via a crafted file (CVE-2018-11037)
exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338)
exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229)
exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230)
exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282)
exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581)
exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915)
exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107)
exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108)
exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535)
exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607)
exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096)
exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097)
exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098)
exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099)
exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143)
exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109)
exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111)
exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112)
exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113)
exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114)
exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
bugzilla.redhat.com/show_bug.cgi?id=1531171
bugzilla.redhat.com/show_bug.cgi?id=1531724
bugzilla.redhat.com/show_bug.cgi?id=1566725
bugzilla.redhat.com/show_bug.cgi?id=1566731
bugzilla.redhat.com/show_bug.cgi?id=1566735
bugzilla.redhat.com/show_bug.cgi?id=1566737
bugzilla.redhat.com/show_bug.cgi?id=1579544
bugzilla.redhat.com/show_bug.cgi?id=1594627
bugzilla.redhat.com/show_bug.cgi?id=1609396
bugzilla.redhat.com/show_bug.cgi?id=1632481
bugzilla.redhat.com/show_bug.cgi?id=1632484
bugzilla.redhat.com/show_bug.cgi?id=1632490
bugzilla.redhat.com/show_bug.cgi?id=1635045
bugzilla.redhat.com/show_bug.cgi?id=1646555
bugzilla.redhat.com/show_bug.cgi?id=1649094
bugzilla.redhat.com/show_bug.cgi?id=1649101
bugzilla.redhat.com/show_bug.cgi?id=1651917
bugzilla.redhat.com/show_bug.cgi?id=1656187
bugzilla.redhat.com/show_bug.cgi?id=1656195
bugzilla.redhat.com/show_bug.cgi?id=1660423
bugzilla.redhat.com/show_bug.cgi?id=1660424
bugzilla.redhat.com/show_bug.cgi?id=1660425
bugzilla.redhat.com/show_bug.cgi?id=1660426
bugzilla.redhat.com/show_bug.cgi?id=1684381
bugzilla.redhat.com/show_bug.cgi?id=1728484
bugzilla.redhat.com/show_bug.cgi?id=1728488
bugzilla.redhat.com/show_bug.cgi?id=1728490
bugzilla.redhat.com/show_bug.cgi?id=1728492
bugzilla.redhat.com/show_bug.cgi?id=1728494
bugzilla.redhat.com/show_bug.cgi?id=1757444
bugzilla.redhat.com/show_bug.cgi?id=1757445
bugzilla.redhat.com/show_bug.cgi?id=1767748
bugzilla.redhat.com/show_bug.cgi?id=1800472
errata.rockylinux.org/RLSA-2020:1577
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
High
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.011 Low
EPSS
Percentile
84.0%