First published: Mon Apr 05 2021(Updated: )
A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/exiv2 | <=0.27.3-3+deb11u1 | 0.25-4+deb10u2 0.25-4+deb10u4 0.27.3-3+deb11u2 0.27.6-1 |
Exiv2 Exiv2 | <=0.27.3 | |
Exiv2 Exiv2 | =0.27.4-rc1 | |
Redhat Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
redhat/exiv2 | <0.27.4 | 0.27.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.