<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">exiv2-0.27.5-3.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:12381</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">exiv2-0.27.5-3.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the exiv2-0.27.5-3.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-12381</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:12381</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-13108/</URL>
      <Description>SUSE CVE CVE-2019-13108 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-19716/</URL>
      <Description>SUSE CVE CVE-2020-19716 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29457/</URL>
      <Description>SUSE CVE CVE-2021-29457 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29470/</URL>
      <Description>SUSE CVE CVE-2021-29470 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-31291/</URL>
      <Description>SUSE CVE CVE-2021-31291 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-32617/</URL>
      <Description>SUSE CVE CVE-2021-32617 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-37620/</URL>
      <Description>SUSE CVE CVE-2021-37620 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-37621/</URL>
      <Description>SUSE CVE CVE-2021-37621 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="exiv2-0.27.5-3.1">
      <FullProductName ProductID="exiv2-0.27.5-3.1">exiv2-0.27.5-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="exiv2-lang-0.27.5-3.1">
      <FullProductName ProductID="exiv2-lang-0.27.5-3.1">exiv2-lang-0.27.5-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libexiv2-27-0.27.5-3.1">
      <FullProductName ProductID="libexiv2-27-0.27.5-3.1">libexiv2-27-0.27.5-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libexiv2-27-32bit-0.27.5-3.1">
      <FullProductName ProductID="libexiv2-27-32bit-0.27.5-3.1">libexiv2-27-32bit-0.27.5-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libexiv2-devel-0.27.5-3.1">
      <FullProductName ProductID="libexiv2-devel-0.27.5-3.1">libexiv2-devel-0.27.5-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libexiv2-xmp-static-0.27.5-3.1">
      <FullProductName ProductID="libexiv2-xmp-static-0.27.5-3.1">libexiv2-xmp-static-0.27.5-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="exiv2-0.27.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:exiv2-0.27.5-3.1">exiv2-0.27.5-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="exiv2-lang-0.27.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:exiv2-lang-0.27.5-3.1">exiv2-lang-0.27.5-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libexiv2-27-0.27.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libexiv2-27-0.27.5-3.1">libexiv2-27-0.27.5-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libexiv2-27-32bit-0.27.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libexiv2-27-32bit-0.27.5-3.1">libexiv2-27-32bit-0.27.5-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libexiv2-devel-0.27.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libexiv2-devel-0.27.5-3.1">libexiv2-devel-0.27.5-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libexiv2-xmp-static-0.27.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libexiv2-xmp-static-0.27.5-3.1">libexiv2-xmp-static-0.27.5-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a zero value for iccOffset.</Note>
    </Notes>
    <CVE>CVE-2019-13108</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:exiv2-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:exiv2-lang-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-27-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-27-32bit-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-devel-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-xmp-static-0.27.5-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-13108.html</URL>
        <Description>CVE-2019-13108</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1142675</URL>
        <Description>SUSE Bug 1142675</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow vulnerability in the Databuf function in types.cpp of Exiv2 v0.27.1 leads to a denial of service (DOS).</Note>
    </Notes>
    <CVE>CVE-2020-19716</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:exiv2-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:exiv2-lang-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-27-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-27-32bit-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-devel-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-xmp-static-0.27.5-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-19716.html</URL>
        <Description>CVE-2020-19716</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188645</URL>
        <Description>SUSE Bug 1188645</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4.</Note>
    </Notes>
    <CVE>CVE-2021-29457</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:exiv2-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:exiv2-lang-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-27-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-27-32bit-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-devel-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-xmp-static-0.27.5-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29457.html</URL>
        <Description>CVE-2021-29457</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185002</URL>
        <Description>SUSE Bug 1185002</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4.</Note>
    </Notes>
    <CVE>CVE-2021-29470</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:exiv2-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:exiv2-lang-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-27-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-27-32bit-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-devel-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-xmp-static-0.27.5-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29470.html</URL>
        <Description>CVE-2021-29470</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185447</URL>
        <Description>SUSE Bug 1185447</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-29457. Reason: This candidate is a duplicate of CVE-2021-29457. Notes: All CVE users should reference CVE-2021-29457 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2021-31291</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:exiv2-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:exiv2-lang-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-27-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-27-32bit-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-devel-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-xmp-static-0.27.5-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-31291.html</URL>
        <Description>CVE-2021-31291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188733</URL>
        <Description>SUSE Bug 1188733</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `rm`.</Note>
    </Notes>
    <CVE>CVE-2021-32617</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:exiv2-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:exiv2-lang-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-27-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-27-32bit-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-devel-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-xmp-static-0.27.5-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-32617.html</URL>
        <Description>CVE-2021-32617</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186192</URL>
        <Description>SUSE Bug 1186192</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.5.</Note>
    </Notes>
    <CVE>CVE-2021-37620</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:exiv2-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:exiv2-lang-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-27-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-27-32bit-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-devel-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-xmp-static-0.27.5-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-37620.html</URL>
        <Description>CVE-2021-37620</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189332</URL>
        <Description>SUSE Bug 1189332</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An infinite loop was found in Exiv2 versions v0.27.4 and earlier. The infinite loop is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the image ICC profile, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p C`). The bug is fixed in version v0.27.5.</Note>
    </Notes>
    <CVE>CVE-2021-37621</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:exiv2-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:exiv2-lang-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-27-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-27-32bit-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-devel-0.27.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libexiv2-xmp-static-0.27.5-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-37621.html</URL>
        <Description>CVE-2021-37621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189333</URL>
        <Description>SUSE Bug 1189333</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
