compat-exiv2-026 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the compat-exiv2-026 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Use After Free

*
  • M
Out-of-bounds Write

<0:0.26-7.el8
  • M
Out-of-bounds Write

<0:0.26-7.el8
  • M
Out-of-bounds Write

<0:0.26-7.el8
  • M
Out-of-bounds Write

<0:0.26-7.el8
  • M
Out-of-bounds Write

<0:0.26-7.el8
  • M
Out-of-bounds Write

<0:0.26-7.el8
  • M
Out-of-bounds Write

<0:0.26-7.el8
  • M
Out-of-bounds Write

<0:0.26-7.el8
  • M
Out-of-bounds Write

<0:0.26-7.el8
  • L
Out-of-Bounds

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Integer Overflow or Wraparound

*
  • L
Divide By Zero

*
  • L
Reachable Assertion

*
  • L
Out-of-bounds Read

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Out-of-bounds Read

<0:0.26-6.el8
  • M
Integer Overflow or Wraparound

<0:0.26-6.el8
  • M
Integer Overflow or Wraparound

<0:0.26-6.el8
  • M
Integer Overflow or Wraparound

<0:0.26-6.el8
  • M
Integer Overflow or Wraparound

<0:0.26-6.el8
  • M
Integer Overflow or Wraparound

<0:0.26-6.el8
  • M
Integer Overflow or Wraparound

<0:0.26-6.el8
  • M
Integer Overflow or Wraparound

<0:0.26-6.el8
  • M
Integer Overflow or Wraparound

<0:0.26-6.el8
  • M
Integer Overflow or Wraparound

<0:0.26-6.el8
  • H
Out-of-bounds Write

<0:0.26-4.el8_2
  • H
Out-of-bounds Write

<0:0.26-4.el8_2
  • H
Out-of-bounds Write

<0:0.26-4.el8_4
  • H
Out-of-bounds Write

<0:0.26-4.el8_4
  • H
Out-of-bounds Write

<0:0.26-4.el8_2
  • H
Out-of-bounds Write

<0:0.26-4.el8_4
  • H
Out-of-bounds Write

<0:0.26-4.el8_4
  • H
Out-of-bounds Write

<0:0.26-4.el8_4
  • H
Out-of-bounds Write

<0:0.26-4.el8_4
  • H
Out-of-bounds Write

<0:0.26-4.el8_4
  • H
Out-of-bounds Write

<0:0.26-4.el8_4
  • H
Out-of-bounds Write

<0:0.26-4.el8_4
  • H
Out-of-bounds Write

<0:0.26-4.el8_4
  • H
Out-of-bounds Write

<0:0.26-4.el8_2
  • H
Out-of-bounds Write

<0:0.26-4.el8_4
  • H
Out-of-bounds Write

<0:0.26-4.el8_4
  • H
Out-of-bounds Write

<0:0.26-4.el8_4
  • L
Out-of-bounds Read

*
  • L
Resource Exhaustion

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*