Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An infinite loop is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.5.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
https://github.com/Exiv2/exiv2/security/advisories/GHSA-hqjh-hpv8-8r9p | third party advisory patch |
https://github.com/Exiv2/exiv2/pull/1766 | third party advisory patch |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ | vendor advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html | third party advisory mailing list |
https://security.gentoo.org/glsa/202312-06 | vendor advisory |