-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.1759
                   [DLA 2214-1] libexif security update
                                18 May 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libexif
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Increased Privileges     -- Remote with User Interaction
                   Denial of Service        -- Remote with User Interaction
                   Access Confidential Data -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-12767 CVE-2020-0093 CVE-2018-20030
                   CVE-2017-7544 CVE-2016-6328 

Reference:         ESB-2020.1683
                   ESB-2020.1591
                   ESB-2020.0718
                   ESB-2020.0680
                   ESB-2020.0481

Original Bulletin: 
   https://www.debian.org/lts/security/2020/dla-2214

- --------------------------BEGIN INCLUDED TEXT--------------------

[DLA 2214-1] libexif security update

Package        : libexif
Version        : 0.6.21-2+deb8u2
CVE ID         : CVE-2016-6328 CVE-2017-7544 CVE-2018-20030 CVE-2020-0093
                 CVE-2020-12767
Debian Bug     : #960199 #918730 #876466 #873022


Various vulnerabilities have been addressed in libexif, a library to
parse EXIF metadata files.

CVE-2016-6328

    An integer overflow when parsing the MNOTE entry data of the input
    file had been found. This could have caused Denial-of-Service (DoS)
    and Information Disclosure (disclosing some critical heap chunk
    metadata, even other applications' private data).

CVE-2017-7544

    libexif had been vulnerable to out-of-bounds heap read vulnerability
    in exif_data_save_data_entry function in libexif/exif-data.c caused
    by improper length computation of the allocated data of an ExifMnote
    entry which could have caused denial-of-service or possibly information
    disclosure.

CVE-2018-20030

    An error when processing the EXIF_IFD_INTEROPERABILITY and
    EXIF_IFD_EXIF tags within libexif version could have been exploited
    to exhaust available CPU resources.

CVE-2020-0093

    In exif_data_save_data_entry of exif-data.c, there was a possible out
    of bounds read due to a missing bounds check. This could have lead to
    local information disclosure with no additional execution privileges
    needed. User interaction was needed for exploitation.

CVE-2020-12767

    libexif had a divide-by-zero error in exif_entry_get_value in
    exif-entry.c

For Debian 8 "Jessie", these problems have been fixed in version
0.6.21-2+deb8u2.

We recommend that you upgrade your libexif packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunweaver@debian.org, http://sunweavers.net

- -----BEGIN PGP SIGNATURE-----
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=7eUo
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=onWh
-----END PGP SIGNATURE-----