Name | CVE-2021-22204 |
Description | Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2663-1, DSA-4910-1 |
Debian Bugs | 987505 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libimage-exiftool-perl (PTS) | bullseye | 12.16+dfsg-2 | fixed |
| bookworm | 12.57+dfsg-1 | fixed |
| sid, trixie | 13.10+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://bugs.launchpad.net/bugs/1925985
https://github.com/exiftool/exiftool/commit/cf0f4e7dcd024ca99615bfd1102a841a25dde031#diff-fa0d652d10dbcd246e6b1df16c1e992931d3bb717a7e36157596b76bdadb3800
https://devcraft.io/2021/05/04/exiftool-arbitrary-code-execution-cve-2021-22204.html