First published: Wed Feb 05 2020(Updated: )
It was discovered that Exiv2 incorrectly handled certain images. An attacker could possibly use this issue to cause a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/exiv2 | <0.25-4ubuntu2.2 | 0.25-4ubuntu2.2 |
Ubuntu | =19.10 | |
All of | ||
ubuntu/libexiv2-14 | <0.25-4ubuntu2.2 | 0.25-4ubuntu2.2 |
Ubuntu | =19.10 | |
All of | ||
ubuntu/exiv2 | <0.25-3.1ubuntu0.18.04.5 | 0.25-3.1ubuntu0.18.04.5 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libexiv2-14 | <0.25-3.1ubuntu0.18.04.5 | 0.25-3.1ubuntu0.18.04.5 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/exiv2 | <0.25-2.1ubuntu16.04.6 | 0.25-2.1ubuntu16.04.6 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/libexiv2-14 | <0.25-2.1ubuntu16.04.6 | 0.25-2.1ubuntu16.04.6 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4270-1 is classified as a denial of service vulnerability.
To fix USN-4270-1, update the exiv2 and libexiv2-14 packages to the specified secure versions for your Ubuntu distribution.
Ubuntu versions 16.04, 18.04, and 19.10 are affected by USN-4270-1.
The vulnerable packages in USN-4270-1 are exiv2 and libexiv2-14.
Currently, there is no known exploit specifically targeting the denial of service vulnerability in USN-4270-1.