• CVE-2021-32815

发布时间: 2021年12月7日

修改时间: 2024年10月31日

概要

Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The assertion failure is triggered when Exiv2 is used to modify the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when modifying the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `fi`. ### Patches The bug is fixed in version v0.27.5. ### References Regression test and bug fix: #1739 ### For more information Please see our [security policy](https://github.com/Exiv2/exiv2/security/policy) for information about Exiv2 security.

CVSS v3 指标

NVD openEuler
Confidentiality None None
Attack Vector Local Local
CVSS评分 5.5 5.5
Attack Complexity Low Low
Privileges Required None None
Scope Unchanged Unchanged
Integrity None None
User Interaction Required Required
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2021-1450 exiv2 security update 2021年12月7日
KylinSec-SA-2022-2092 exiv2 security update 2022年9月23日
KylinSec-SA-2022-2553 exiv2 security update 2022年11月4日

影响产品

产品 状态
KY3.4-4A exiv2 Fixed
KY3.4-5 exiv2 Fixed
KY3.5.1 exiv2 Fixed