Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-31291

Опубликовано: 26 июл. 2021
Источник: ubuntu
Приоритет: medium

Описание

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-29457. Reason: This candidate is a duplicate of CVE-2021-29457. Notes: All CVE users should reference CVE-2021-29457 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage

РелизСтатусПримечание
bionic

released

0.25-3.1ubuntu0.18.04.10
devel

released

0.27.3-3ubuntu3
esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

0.25-3.1ubuntu0.18.04.10
esm-infra/focal

released

0.27.2-8ubuntu2.5
esm-infra/xenial

released

0.25-2.1ubuntu16.04.7+esm3
focal

released

0.27.2-8ubuntu2.5
hirsute

released

0.27.3-3ubuntu1.4
trusty

ignored

end of standard support
trusty/esm

DNE

Показывать по

Связанные уязвимости

CVSS3: 8.1
redhat
больше 4 лет назад

A flaw was found in exiv2. A flawed bounds checking in the jp2Image.cpp:doWriteMetadata function leads to a heap-based buffer overflow. This flaw allows an attacker who can provide a malicious image to an application using the exiv2 library, to write data out of bounds and potentially execute code. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

nvd
больше 4 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-29457. Reason: This candidate is a duplicate of CVE-2021-29457. Notes: All CVE users should reference CVE-2021-29457 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage

rocky
больше 4 лет назад

Important: compat-exiv2-026 security update

rocky
больше 4 лет назад

Important: exiv2 security update

github
больше 3 лет назад

A heap-based buffer overflow vulnerability in jp2image.cpp of Exiv2 0.27.3 allows attackers to cause a denial of service (DOS) via crafted metadata.