First published: Mon Jul 16 2018(Updated: )
A flaw was found in Exiv2 0.26. A heap-based buffer over-read in WebPImage::decodeChunks in webpimage.cpp. References: <a href="https://github.com/Exiv2/exiv2/issues/378">https://github.com/Exiv2/exiv2/issues/378</a> Upstream patch: <a href="https://github.com/Exiv2/exiv2/commit/505e2417e408abaf8f9fe9e5076f567a65cc59c3">https://github.com/Exiv2/exiv2/commit/505e2417e408abaf8f9fe9e5076f567a65cc59c3</a>
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Dos2unix |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1601628 is considered moderate due to the potential for a heap-based buffer over-read.
To fix REDHAT-BUG-1601628, upgrade to a patched version of Exiv2 that addresses this buffer over-read issue.
REDHAT-BUG-1601628 affects Exiv2 version 0.26.
REDHAT-BUG-1601628 is a heap-based buffer over-read vulnerability.
Currently, REDHAT-BUG-1601628 does not have a specific CVE identifier reported.