exiv2 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the exiv2 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Write

<0:0.27.5-2.el8
  • L
Out-of-Bounds

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Integer Overflow or Wraparound

*
  • L
Divide By Zero

*
  • L
Reachable Assertion

*
  • L
Out-of-bounds Read

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-bounds Read

<0:0.27.4-5.el8
  • M
Out-of-bounds Read

<0:0.27.4-5.el8
  • M
Integer Overflow or Wraparound

<0:0.27.4-5.el8
  • H
Out-of-bounds Write

<0:0.27.3-3.el8_4
  • M
Out-of-bounds Read

<0:0.27.4-5.el8
  • M
Incorrect Type Conversion or Cast

<0:0.27.4-5.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:0.27.2-5.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:0.27.2-5.el8
  • M
Stack-based Buffer Overflow

<0:0.27.2-5.el8
  • M
Out-of-bounds Read

<0:0.27.2-5.el8
  • M
Resource Exhaustion

<0:0.27.2-5.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:0.27.2-5.el8
  • M
Out-of-bounds Read

<0:0.27.2-5.el8
  • M
NULL Pointer Dereference

<0:0.27.2-5.el8
  • M
Out-of-bounds Read

<0:0.27.2-5.el8
  • M
Heap-based Buffer Overflow

<0:0.27.2-5.el8
  • M
Reachable Assertion

<0:0.27.2-5.el8
  • M
Out-of-bounds Read

<0:0.27.2-5.el8
  • M
Divide By Zero

<0:0.27.2-5.el8
  • M
Information Exposure

<0:0.27.2-5.el8
  • M
NULL Pointer Dereference

<0:0.27.2-5.el8
  • M
Resource Exhaustion

<0:0.27.2-5.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:0.27.2-5.el8
  • L
Out-of-bounds Read

<0:0.27.3-2.el8
  • M
Out-of-bounds Read

<0:0.27.2-5.el8
  • M
Out-of-bounds Read

<0:0.27.2-5.el8
  • M
Out-of-bounds Read

<0:0.27.2-5.el8
  • M
Integer Overflow or Wraparound

<0:0.27.2-5.el8
  • M
Reachable Assertion

<0:0.27.2-5.el8
  • M
NULL Pointer Dereference

<0:0.27.2-5.el8
  • M
Resource Exhaustion

<0:0.27.2-5.el8
  • M
Integer Overflow or Wraparound

<0:0.27.2-5.el8
  • M
Integer Overflow or Wraparound

<0:0.27.2-5.el8
  • M
Resource Exhaustion

<0:0.27.2-5.el8
  • M
Integer Overflow or Wraparound

<0:0.27.2-5.el8
  • M
NULL Pointer Dereference

<0:0.27.2-5.el8
  • M
Improper Input Validation

<0:0.27.4-5.el8
  • M
Resource Exhaustion

<0:0.27.4-5.el8
  • M
Out-of-bounds Read

<0:0.27.4-5.el8
  • M
Out-of-bounds Read

<0:0.27.4-5.el8
  • M
Improper Input Validation

<0:0.27.4-5.el8
  • M
Out-of-bounds Read

<0:0.27.4-5.el8
  • M
Integer Overflow or Wraparound

<0:0.27.4-5.el8