7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.2 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.01 Low
EPSS
Percentile
83.7%
Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.
The following packages have been upgraded to a later upstream version: exiv2 (0.27.4). (BZ#1989860)
Security Fix(es):
exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() (CVE-2021-3482)
exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29457)
exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode (CVE-2021-29458)
exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29464)
exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29470)
exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29473)
exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS (CVE-2021-31292)
exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata (CVE-2021-29463)
exiv2: Use of uninitialized memory in isWebPType() may lead to information leak (CVE-2021-29623)
exiv2: DoS due to quadratic complexity in ProcessUTF8Portion (CVE-2021-32617)
exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure (CVE-2021-37618)
exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-37619)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
bugzilla.redhat.com/show_bug.cgi?id=1946314
bugzilla.redhat.com/show_bug.cgi?id=1952607
bugzilla.redhat.com/show_bug.cgi?id=1952612
bugzilla.redhat.com/show_bug.cgi?id=1953708
bugzilla.redhat.com/show_bug.cgi?id=1954065
bugzilla.redhat.com/show_bug.cgi?id=1961650
bugzilla.redhat.com/show_bug.cgi?id=1961691
bugzilla.redhat.com/show_bug.cgi?id=1978100
bugzilla.redhat.com/show_bug.cgi?id=1978105
bugzilla.redhat.com/show_bug.cgi?id=1989860
bugzilla.redhat.com/show_bug.cgi?id=1990330
bugzilla.redhat.com/show_bug.cgi?id=1992165
bugzilla.redhat.com/show_bug.cgi?id=1992174
errata.rockylinux.org/RLSA-2021:4173
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.2 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.01 Low
EPSS
Percentile
83.7%