DEBIAN-CVE-2017-14864

Source
https://security-tracker.debian.org/tracker/CVE-2017-14864
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2017-14864.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2017-14864
Upstream
Published
2017-09-29T01:34:49Z
Modified
2025-09-25T22:40:46Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An Invalid memory address dereference was discovered in Exiv2::getULong in types.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.

References

Affected packages

Debian:11 / exiv2

Package

Name
exiv2
Purl
pkg:deb/debian/exiv2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.27.2-6

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / exiv2

Package

Name
exiv2
Purl
pkg:deb/debian/exiv2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.27.2-6

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / exiv2

Package

Name
exiv2
Purl
pkg:deb/debian/exiv2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.27.2-6

Ecosystem specific

{
    "urgency": "low"
}

Debian:14 / exiv2

Package

Name
exiv2
Purl
pkg:deb/debian/exiv2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.27.2-6

Ecosystem specific

{
    "urgency": "low"
}