First published: Thu May 10 2018(Updated: )
In types.cpp in Exiv2 0.26, a large size value may lead to a SIGABRT during an attempt at memory allocation for an Exiv2::Internal::PngChunk::zlibUncompress call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/exiv2 | 0.27.3-3+deb11u2 0.27.3-3+deb11u1 0.27.6-1 0.28.3+dfsg-2 | |
Exiv2 | =0.26 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10958 has a medium severity due to its potential to cause application crashes.
To fix CVE-2018-10958, upgrade Exiv2 to version 0.27.3-3+deb11u2 or later.
Exiv2 version 0.26 is the only version directly affected by CVE-2018-10958.
CVE-2018-10958 impacts Exiv2 0.26, particularly on Debian and Ubuntu systems.
Yes, CVE-2018-10958 can lead to denial of service through application crashes during memory allocation.