git: 0e1cf83190b5 - main - security/vuxml: document vulnerabilities in graphics/exiv2

Tobias C. Berner tcberner at FreeBSD.org
Sun Jul 4 20:56:29 UTC 2021


The branch main has been updated by tcberner:

URL: https://cgit.FreeBSD.org/ports/commit/?id=0e1cf83190b530cb73a9c086a4a2ca1d30776996

commit 0e1cf83190b530cb73a9c086a4a2ca1d30776996
Author:     Daniel Engberg <daniel.engberg.lists at pyret.net>
AuthorDate: 2021-07-04 20:55:14 +0000
Commit:     Tobias C. Berner <tcberner at FreeBSD.org>
CommitDate: 2021-07-04 20:55:52 +0000

    security/vuxml: document vulnerabilities in graphics/exiv2
    
    PR:     256803
---
 security/vuxml/vuln-2021.xml | 56 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 56 insertions(+)

diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml
index 5e1873ff889f..a43789bf44ff 100644
--- a/security/vuxml/vuln-2021.xml
+++ b/security/vuxml/vuln-2021.xml
@@ -1,3 +1,59 @@
+  <vuln vid="d49f86ab-d9c7-11eb-a200-00155d01f201">
+    <topic>Exiv2 -- Multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>exiv2</name>
+	<range><lt>0.27.4,1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Exiv2 teams reports:</p>
+	<blockquote cite="https://github.com/Exiv2/exiv2/security/advisories">
+	  <p>Multiple vulnerabilities covering buffer overflows, out-of-bounds,
+	    read of uninitialized memory and denial of serivce. The heap
+	    overflow is triggered when Exiv2 is used to read the metadata of
+	    a crafted image file. An attacker could potentially exploit the
+	    vulnerability to gain code execution, if they can trick the victim
+	    into running Exiv2 on a crafted image file. The out-of-bounds read
+	    is triggered when Exiv2 is used to write metadata into a crafted
+	    image file. An attacker could potentially exploit the vulnerability
+	    to cause a denial of service by crashing Exiv2, if they can trick
+	    the victim into running Exiv2 on a crafted image file. The read of
+	    uninitialized memory is triggered when Exiv2 is used to read the
+	    metadata of a crafted image file. An attacker could potentially
+	    exploit the vulnerability to leak a few bytes of stack memory, if
+	    they can trick the victim into running Exiv2 on a crafted image
+	    file.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2021-29457</cvename>
+      <url>https://github.com/Exiv2/exiv2/security/advisories/GHSA-v74w-h496-cgqm</url>
+      <cvename>CVE-2021-29458</cvename>
+      <url>https://github.com/Exiv2/exiv2/security/advisories/GHSA-57jj-75fm-9rq5</url>
+      <cvename>CVE-2021-29463</cvename>
+      <url>https://github.com/Exiv2/exiv2/security/advisories/GHSA-5p8g-9xf3-gfrr</url>
+      <cvename>CVE-2021-29464</cvename>
+      <url>https://github.com/Exiv2/exiv2/security/advisories/GHSA-jgm9-5fw5-pw9p</url>
+      <cvename>CVE-2021-29470</cvename>
+      <url>https://github.com/Exiv2/exiv2/security/advisories/GHSA-8949-hhfh-j7rj</url>
+      <cvename>CVE-2021-29473</cvename>
+      <url>https://github.com/Exiv2/exiv2/security/advisories/GHSA-7569-phvm-vwc2</url>
+      <cvename>CVE-2021-29623</cvename>
+      <url>https://github.com/Exiv2/exiv2/security/advisories/GHSA-6253-qjwm-3q4v</url>
+      <cvename>CVE-2021-32617</cvename>
+      <url>https://github.com/Exiv2/exiv2/security/advisories/GHSA-w8mv-g8qq-36mj</url>
+      <cvename>CVE-2021-3482</cvename>
+      <url>https://github.com/Exiv2/exiv2/security/advisories/GHSA-9jp9-m3fv-2vg9</url>
+    </references>
+    <dates>
+      <discovery>2021-04-25</discovery>
+      <entry>2021-06-30</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="f2596f27-db4c-11eb-8bc6-c556d71493c9">
     <topic>openexr v3.0.5 -- fixes miscellaneous security issues</topic>
     <affects>


More information about the dev-commits-ports-main mailing list