Security Bulletin
This security bulletin contains information about 11 vulnerabilities.
EUVDB-ID: #VU69760
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-11591
CWE-ID:
CWE-248 - Uncaught Exception
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a floating point exception in the Exiv2::ValueType function in Exiv2. A remote attacker can pass a specially crafted image to the application and perform a denial of service (DoS) attack.
Update the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU13576
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-11531
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to heap-based buffer overflow in getData in preview.cpp. A remote attacker can trigger memory corruption and perform a denial of service attack.
MitigationUpdate the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69761
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-17581
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources caused by excessive stack consumption due to a recursive function within the CiffDirectory::readDirectory() function in crwimage_int.cpp. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationUpdate the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU36299
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-20097
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.
MitigationUpdate the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU36300
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-20098
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
There is a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.
MitigationUpdate the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU36301
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-20099
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
There is an infinite loop in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.
MitigationUpdate the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU19510
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-13109
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer overflow in Exiv2 through 0.27.1 due to PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction. A remote attacker can create a crafted PNG image file, trigger integer overflow and perform denial of service (DoS) attack.
MitigationUpdate the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20305
Risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C]
CVE-ID: CVE-2019-13110
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform denial of service (DoS) attack.
The vulnerability exists due to integer overflow in CiffDirectory::readDirectory() function. A remote attacker can create a specially crafted CRW image, pass it to the application, trigger integer overflow and crash the affected application.
MitigationUpdate the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU28797
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-17402
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary in Exiv2::getULong() function in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp. A remote attacker can pass specially crafted data to the application, trigger memory corruption and crash the service.
Update the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU55921
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-29473
CWE-ID: N/A
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to perform denial of service (DoS) attack.
The vulnerability exists due to a boundary condition when processing Exif, IPTC, XMP and ICC image metadata. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and crash the affected application.
MitigationUpdate the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69648
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-32815
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion when handling metadata of image files. A remote attacker can pass a specially crafted image to the application and perform a denial of service (DoS) attack.
Update the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.