Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.1759 [DLA 2214-1] libexif security update 18 May 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: libexif Publisher: Debian Operating System: Debian GNU/Linux 8 Impact/Access: Increased Privileges -- Remote with User Interaction Denial of Service -- Remote with User Interaction Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-12767 CVE-2020-0093 CVE-2018-20030 CVE-2017-7544 CVE-2016-6328 Reference: ESB-2020.1683 ESB-2020.1591 ESB-2020.0718 ESB-2020.0680 ESB-2020.0481 Original Bulletin: https://www.debian.org/lts/security/2020/dla-2214 - --------------------------BEGIN INCLUDED TEXT-------------------- [DLA 2214-1] libexif security update Package : libexif Version : 0.6.21-2+deb8u2 CVE ID : CVE-2016-6328 CVE-2017-7544 CVE-2018-20030 CVE-2020-0093 CVE-2020-12767 Debian Bug : #960199 #918730 #876466 #873022 Various vulnerabilities have been addressed in libexif, a library to parse EXIF metadata files. CVE-2016-6328 An integer overflow when parsing the MNOTE entry data of the input file had been found. This could have caused Denial-of-Service (DoS) and Information Disclosure (disclosing some critical heap chunk metadata, even other applications' private data). CVE-2017-7544 libexif had been vulnerable to out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c caused by improper length computation of the allocated data of an ExifMnote entry which could have caused denial-of-service or possibly information disclosure. CVE-2018-20030 An error when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EXIF tags within libexif version could have been exploited to exhaust available CPU resources. CVE-2020-0093 In exif_data_save_data_entry of exif-data.c, there was a possible out of bounds read due to a missing bounds check. This could have lead to local information disclosure with no additional execution privileges needed. User interaction was needed for exploitation. CVE-2020-12767 libexif had a divide-by-zero error in exif_entry_get_value in exif-entry.c For Debian 8 "Jessie", these problems have been fixed in version 0.6.21-2+deb8u2. We recommend that you upgrade your libexif packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS mike gabriel aka sunweaver (Debian Developer) fon: +49 (1520) 1976 148 GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22 0782 9AF4 6B30 2577 1B31 mail: sunweaver@debian.org, http://sunweavers.net - -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEm/uu6GwKpf+/IgeCmvRrMCV3GzEFAl7CGSEACgkQmvRrMCV3 GzEYIQ//dfesowM+3QrcKdRpJjJXJV/b9NyvFn0202CoVhHVnfsdjstnGSL8rVDT Z6YhDfrp/yWN464kpWtvutFD0fGQFyzdNNHsPG+bh6H9X3Bp4utAJN4dUT3+dEOS aGsmWGVahsEsmbo+nk0yytLTU41jOnGOB4PSQm5ell9EPoV/d+/pK9a1gBapZtnp 76rTFb+6MoBi6+3jPvgZ736dSk3OTknRZQz7yng6sNcFX/Nkj6mvIuuEGdWEHVq6 pfWBwu6Ql4BquiYylh+NbviG7AO4+brMNpZZvgoAwWKHYqipD/5dr7gZO+VzOS6G z20KIenOEYBsTX9Y/CJ7f1FhP6DANnskMs3zgstAcc/vugFc1R/KWp722JKr+PrQ wLlRi1BkSidt/CtDSd75zErhWY/Dm0Hfux7zkwWty44Rgv4+3dFVHvVbRAlgWS9Q O5Z+xbfcViEaTdhFOG9zwtVv70RVswVi7NBcI3JLsSNRN6u4lJ8cEC7Vi4D4hDR2 2J63ujH8anxc/azR+lCttjnR3YMeHZPGUeoLc37pmEVquxLAidW0kZMLmPSKqM3L hBkBJy4NMLvG8eC/PE95xX7r2qLE6zAbwhJ9vwaW4fham/mlGmKIIq9B6umn2QcO 9+xusfnynTPFDPEevPlP2NbYdDe8XIspyA500Z3j1J1jwOIQn00= =7eUo - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXsI+iONLKJtyKPYoAQgIUA/8CSx2eje1oPN3kI5uV1MZCbHQZI7JtGlM GGK1bg3f74/qzDt286lgcUL5jO3pXOYJ7Oft/gtwoOZ3Chuuryuz3GFEhqacr7EM vYDI/XKImdNJU8ywaZepRgxnzn4SM8ZcisrjEpiO12o6bMSGpgCMTeMsnHvFnt97 F/UHHN/5g9y0p1fObU7hggpjNx/63tBoW6jRBGNLCXMAnNUXeJLp9yr0c4v9EDfF MrJNLAfCFFdrZmXSprraR6YOyHWzxR9mUBIndNSM2zzqRZ7g1BAyenAfuEUzKNJS FObEm+IcB9s50nQTjwNLOZswolELBAamJOorYGqoy6YamN9z/wI3I3KbSeeKCHrG 4HzlZjGyX0R2d/H22JjAb5yweVbAJYyezR94fCRYq5Ruury7NGx7G5ZDPMTbTJZw Rrff5C759Vqk/2e4J8/DPEhIO9IbVFweQCpbKcNc2FitTYsG9Xdz+aRGbx0zshWY pwhyDyfcABizjPW8PEAhwdo9RtXNNvs5aMvWNEgAlvOYWZe+LEg/6Se//T9lGUwL wLKQtnDec+3gON/lPvpAnZge2cvJeAvLPWxpWokruPBu/X+Hvr6i15t1LQQdI8zm Alx4dTnfTzh2BjmfM0eyrUCoGeRwRXwbN+6hyfqeDC5PdUF20bPoZWu1LMvjz1i5 QercejtHQQE= =onWh -----END PGP SIGNATURE-----