SUSE SLED15 / SLES15 / openSUSE 15 Security Update : exiv2 (SUSE-SU-2022:3889-1)

high Nessus Plugin ID 167062

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:3889-1 advisory.

Updated to version 0.27.5 (jsc#PED-1393):

- CVE-2017-1000128: Fixed stack out of bounds read in JPEG2000 parser (bsc#1068871).
- CVE-2019-13108: Fixed integer overflow PngImage:readMetadata (bsc#1142675).
- CVE-2020-19716: Fixed buffer overflow vulnerability in the Databuf function in types.cpp (bsc#1188645).
- CVE-2021-29457: Fixed heap buffer overflow when write metadata into a crafted image file (bsc#1185002).
- CVE-2021-29470: Fixed out-of-bounds read in Exiv2:Jp2Image:encodeJp2Header (bsc#1185447).
- CVE-2021-29623: Fixed read of uninitialized memory (bsc#1186053).
- CVE-2021-31291: Fixed heap-based buffer overflow in jp2image.cpp (bsc#1188733).
- CVE-2021-32617: Fixed denial of service due to inefficient algorithm (bsc#1186192).
- CVE-2021-37620: Fixed out-of-bounds read in XmpTextValue:read() (bsc#1189332).
- CVE-2021-37621: Fixed DoS due to infinite loop in Image:printIFDStructure (bsc#1189333).
- CVE-2021-37622: Fixed DoS due to infinite loop in JpegBase:printStructure (bsc#1189334)
- CVE-2021-34334: Fixed DoS due to integer overflow in loop counter(bsc#1189338)
- CVE-2021-37623: Fixed DoS due to infinite loop in JpegBase:printStructure (bsc#1189335)
- CVE-2021-29463: Fixed out-of-bounds read in webpimage.cpp (bsc#1185913).
- CVE-2021-34334: Fixed DoS due to integer overflow in loop counter (bsc#1189338)
- CVE-2019-13111: Fixed integer overflow in WebPImage:decodeChunks that lead to denial of service (bsc#1142679)
- CVE-2021-29463: Fixed an out-of-bounds read was found in webpimage.cpp (bsc#1185913)

Bugfixes:

- Fixed build using GCC 11 (bsc#1185218).

A new libexiv2-2_27 shared library is shipped, the libexiv2-2_26 is provided only for compatibility now.

Please recompile your applications using the exiv2 library.

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1068871

https://bugzilla.suse.com/1142675

https://bugzilla.suse.com/1142679

https://bugzilla.suse.com/1185002

https://bugzilla.suse.com/1185218

https://bugzilla.suse.com/1185447

https://bugzilla.suse.com/1185913

https://bugzilla.suse.com/1186053

https://bugzilla.suse.com/1186192

https://bugzilla.suse.com/1188645

https://bugzilla.suse.com/1188733

https://bugzilla.suse.com/1189332

https://bugzilla.suse.com/1189333

https://bugzilla.suse.com/1189334

https://bugzilla.suse.com/1189335

https://bugzilla.suse.com/1189338

http://www.nessus.org/u?c2410a1d

https://www.suse.com/security/cve/CVE-2017-1000128

https://www.suse.com/security/cve/CVE-2019-13108

https://www.suse.com/security/cve/CVE-2019-13111

https://www.suse.com/security/cve/CVE-2020-19716

https://www.suse.com/security/cve/CVE-2021-29457

https://www.suse.com/security/cve/CVE-2021-29463

https://www.suse.com/security/cve/CVE-2021-29470

https://www.suse.com/security/cve/CVE-2021-29623

https://www.suse.com/security/cve/CVE-2021-32617

https://www.suse.com/security/cve/CVE-2021-34334

https://www.suse.com/security/cve/CVE-2021-37620

https://www.suse.com/security/cve/CVE-2021-37621

https://www.suse.com/security/cve/CVE-2021-37622

https://www.suse.com/security/cve/CVE-2021-37623

Plugin Details

Severity: High

ID: 167062

File Name: suse_SU-2022-3889-1.nasl

Version: 1.10

Type: local

Agent: unix

Published: 11/8/2022

Updated: 9/24/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-29457

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:libexiv2-devel, p-cpe:/a:novell:suse_linux:libexiv2-xmp-static, p-cpe:/a:novell:suse_linux:libexiv2-26, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:libexiv2-27

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/7/2022

Vulnerability Publication Date: 11/17/2017

Reference Information

CVE: CVE-2017-1000128, CVE-2019-13108, CVE-2019-13111, CVE-2020-19716, CVE-2021-29457, CVE-2021-29463, CVE-2021-29470, CVE-2021-29623, CVE-2021-32617, CVE-2021-34334, CVE-2021-37620, CVE-2021-37621, CVE-2021-37622, CVE-2021-37623

SuSE: SUSE-SU-2022:3889-1