Vulnerability from csaf_suse
Published
2020-07-08 07:54
Modified
2020-07-08 07:54
Summary
Security update for libexif
Notes
Title of the patch
Security update for libexif
Description of the patch
This update for libexif to 0.6.22 fixes the following issues:
Security issues fixed:
- CVE-2016-6328: Fixed an integer overflow in parsing MNOTE entry data of the input file (bsc#1055857).
- CVE-2017-7544: Fixed an out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c (bsc#1059893).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2020-0093: Fixed an out-of-bounds read in exif_data_save_data_entry (bsc#1171847).
- CVE-2020-12767: Fixed a divide-by-zero error in exif_entry_get_value (bsc#1171475).
- CVE-2020-13112: Fixed a time consumption DoS when parsing canon array markers (bsc#1172121).
- CVE-2020-13113: Fixed a potential use of uninitialized memory (bsc#1172105).
- CVE-2020-13114: Fixed various buffer overread fixes due to integer overflows in maker notes (bsc#1172116).
Non-security issues fixed:
- libexif was updated to version 0.6.22:
* New translations: ms
* Updated translations for most languages
* Some useful EXIF 2.3 tag added:
* EXIF_TAG_GAMMA
* EXIF_TAG_COMPOSITE_IMAGE
* EXIF_TAG_SOURCE_IMAGE_NUMBER_OF_COMPOSITE_IMAGE
* EXIF_TAG_SOURCE_EXPOSURE_TIMES_OF_COMPOSITE_IMAGE
* EXIF_TAG_GPS_H_POSITIONING_ERROR
* EXIF_TAG_CAMERA_OWNER_NAME
* EXIF_TAG_BODY_SERIAL_NUMBER
* EXIF_TAG_LENS_SPECIFICATION
* EXIF_TAG_LENS_MAKE
* EXIF_TAG_LENS_MODEL
* EXIF_TAG_LENS_SERIAL_NUMBER
Patchnames
SUSE-2020-1553,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-1553,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1553,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1553
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for libexif", title: "Title of the patch", }, { category: "description", text: "This update for libexif to 0.6.22 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2016-6328: Fixed an integer overflow in parsing MNOTE entry data of the input file (bsc#1055857).\n- CVE-2017-7544: Fixed an out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c (bsc#1059893).\n- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).\n- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).\n- CVE-2020-0093: Fixed an out-of-bounds read in exif_data_save_data_entry (bsc#1171847).\n- CVE-2020-12767: Fixed a divide-by-zero error in exif_entry_get_value (bsc#1171475).\n- CVE-2020-13112: Fixed a time consumption DoS when parsing canon array markers (bsc#1172121).\n- CVE-2020-13113: Fixed a potential use of uninitialized memory (bsc#1172105).\n- CVE-2020-13114: Fixed various buffer overread fixes due to integer overflows in maker notes (bsc#1172116).\n\nNon-security issues fixed:\n\n- libexif was updated to version 0.6.22:\n * New translations: ms\n * Updated translations for most languages\n * Some useful EXIF 2.3 tag added:\n * EXIF_TAG_GAMMA\n * EXIF_TAG_COMPOSITE_IMAGE\n * EXIF_TAG_SOURCE_IMAGE_NUMBER_OF_COMPOSITE_IMAGE\n * EXIF_TAG_SOURCE_EXPOSURE_TIMES_OF_COMPOSITE_IMAGE\n * EXIF_TAG_GPS_H_POSITIONING_ERROR\n * EXIF_TAG_CAMERA_OWNER_NAME\n * EXIF_TAG_BODY_SERIAL_NUMBER\n * EXIF_TAG_LENS_SPECIFICATION\n * EXIF_TAG_LENS_MAKE\n * EXIF_TAG_LENS_MODEL\n * EXIF_TAG_LENS_SERIAL_NUMBER\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2020-1553,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-1553,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1553,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1553", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1553-2.json", }, { category: "self", summary: "URL for SUSE-SU-2020:1553-2", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20201553-2/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2020:1553-2", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html", }, { category: "self", summary: "SUSE Bug 1055857", url: "https://bugzilla.suse.com/1055857", }, { category: "self", summary: "SUSE Bug 1059893", url: "https://bugzilla.suse.com/1059893", }, { category: "self", summary: "SUSE Bug 1120943", url: "https://bugzilla.suse.com/1120943", }, { category: "self", summary: "SUSE Bug 1160770", url: "https://bugzilla.suse.com/1160770", }, { category: "self", summary: "SUSE Bug 1171475", url: "https://bugzilla.suse.com/1171475", }, { category: "self", summary: "SUSE Bug 1171847", url: "https://bugzilla.suse.com/1171847", }, { category: "self", summary: "SUSE Bug 1172105", url: "https://bugzilla.suse.com/1172105", }, { category: "self", summary: "SUSE Bug 1172116", url: "https://bugzilla.suse.com/1172116", }, { category: "self", summary: "SUSE Bug 1172121", url: "https://bugzilla.suse.com/1172121", }, { category: "self", summary: "SUSE CVE CVE-2016-6328 page", url: "https://www.suse.com/security/cve/CVE-2016-6328/", }, { category: "self", summary: "SUSE CVE CVE-2017-7544 page", url: "https://www.suse.com/security/cve/CVE-2017-7544/", }, { category: "self", summary: "SUSE CVE CVE-2018-20030 page", url: "https://www.suse.com/security/cve/CVE-2018-20030/", }, { category: "self", summary: "SUSE CVE CVE-2019-9278 page", url: "https://www.suse.com/security/cve/CVE-2019-9278/", }, { category: "self", summary: "SUSE CVE CVE-2020-0093 page", url: "https://www.suse.com/security/cve/CVE-2020-0093/", }, { category: "self", summary: "SUSE CVE CVE-2020-12767 page", url: "https://www.suse.com/security/cve/CVE-2020-12767/", }, { category: "self", summary: "SUSE CVE CVE-2020-13112 page", url: "https://www.suse.com/security/cve/CVE-2020-13112/", }, { category: "self", summary: "SUSE CVE CVE-2020-13113 page", url: "https://www.suse.com/security/cve/CVE-2020-13113/", }, { category: "self", summary: "SUSE CVE CVE-2020-13114 page", url: "https://www.suse.com/security/cve/CVE-2020-13114/", }, ], title: "Security update for libexif", tracking: { current_release_date: "2020-07-08T07:54:11Z", generator: { date: "2020-07-08T07:54:11Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2020:1553-2", initial_release_date: "2020-07-08T07:54:11Z", revision_history: [ { date: "2020-07-08T07:54:11Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libexif-devel-0.6.22-5.6.1.aarch64", product: { name: "libexif-devel-0.6.22-5.6.1.aarch64", product_id: "libexif-devel-0.6.22-5.6.1.aarch64", }, }, { category: "product_version", name: "libexif12-0.6.22-5.6.1.aarch64", product: { name: "libexif12-0.6.22-5.6.1.aarch64", product_id: "libexif12-0.6.22-5.6.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libexif-devel-64bit-0.6.22-5.6.1.aarch64_ilp32", product: { name: "libexif-devel-64bit-0.6.22-5.6.1.aarch64_ilp32", product_id: "libexif-devel-64bit-0.6.22-5.6.1.aarch64_ilp32", }, }, { category: "product_version", name: "libexif12-64bit-0.6.22-5.6.1.aarch64_ilp32", product: { name: "libexif12-64bit-0.6.22-5.6.1.aarch64_ilp32", product_id: "libexif12-64bit-0.6.22-5.6.1.aarch64_ilp32", }, }, ], category: "architecture", name: "aarch64_ilp32", }, { branches: [ { category: "product_version", name: "libexif-devel-0.6.22-5.6.1.i586", product: { name: "libexif-devel-0.6.22-5.6.1.i586", product_id: "libexif-devel-0.6.22-5.6.1.i586", }, }, { category: "product_version", name: "libexif12-0.6.22-5.6.1.i586", product: { name: "libexif12-0.6.22-5.6.1.i586", product_id: "libexif12-0.6.22-5.6.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "libexif-devel-0.6.22-5.6.1.ppc64le", product: { name: "libexif-devel-0.6.22-5.6.1.ppc64le", product_id: "libexif-devel-0.6.22-5.6.1.ppc64le", }, }, { category: "product_version", name: "libexif12-0.6.22-5.6.1.ppc64le", product: { name: "libexif12-0.6.22-5.6.1.ppc64le", product_id: "libexif12-0.6.22-5.6.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libexif-devel-0.6.22-5.6.1.s390x", product: { name: "libexif-devel-0.6.22-5.6.1.s390x", product_id: "libexif-devel-0.6.22-5.6.1.s390x", }, }, { category: "product_version", name: "libexif12-0.6.22-5.6.1.s390x", product: { name: "libexif12-0.6.22-5.6.1.s390x", product_id: "libexif12-0.6.22-5.6.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libexif-devel-0.6.22-5.6.1.x86_64", product: { name: "libexif-devel-0.6.22-5.6.1.x86_64", product_id: "libexif-devel-0.6.22-5.6.1.x86_64", }, }, { category: "product_version", name: "libexif-devel-32bit-0.6.22-5.6.1.x86_64", product: { name: "libexif-devel-32bit-0.6.22-5.6.1.x86_64", product_id: "libexif-devel-32bit-0.6.22-5.6.1.x86_64", }, }, { category: "product_version", name: "libexif12-0.6.22-5.6.1.x86_64", product: { name: "libexif12-0.6.22-5.6.1.x86_64", product_id: "libexif12-0.6.22-5.6.1.x86_64", }, }, { category: "product_version", name: "libexif12-32bit-0.6.22-5.6.1.x86_64", product: { name: "libexif12-32bit-0.6.22-5.6.1.x86_64", product_id: "libexif12-32bit-0.6.22-5.6.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2", product: { name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-desktop-applications:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Package Hub 15 SP1", product: { name: "SUSE Linux Enterprise Module for Package Hub 15 SP1", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:packagehub:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Package Hub 15 SP2", product: { name: "SUSE Linux Enterprise Module for Package Hub 15 SP2", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:packagehub:15:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libexif-devel-0.6.22-5.6.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP2", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", }, product_reference: "libexif-devel-0.6.22-5.6.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libexif-devel-0.6.22-5.6.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP2", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", }, product_reference: "libexif-devel-0.6.22-5.6.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libexif-devel-0.6.22-5.6.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP2", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", }, product_reference: "libexif-devel-0.6.22-5.6.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libexif-devel-0.6.22-5.6.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP2", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", }, product_reference: "libexif-devel-0.6.22-5.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libexif12-0.6.22-5.6.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP2", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", }, product_reference: "libexif12-0.6.22-5.6.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libexif12-0.6.22-5.6.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP2", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", }, product_reference: "libexif12-0.6.22-5.6.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libexif12-0.6.22-5.6.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP2", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", }, product_reference: "libexif12-0.6.22-5.6.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libexif12-0.6.22-5.6.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP2", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", }, product_reference: "libexif12-0.6.22-5.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libexif12-32bit-0.6.22-5.6.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP1", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", }, product_reference: "libexif12-32bit-0.6.22-5.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libexif12-32bit-0.6.22-5.6.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP2", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", }, product_reference: "libexif12-32bit-0.6.22-5.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP2", }, ], }, vulnerabilities: [ { cve: "CVE-2016-6328", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6328", }, ], notes: [ { category: "general", text: "A vulnerability was found in libexif. An integer overflow when parsing the MNOTE entry data of the input file. This can cause Denial-of-Service (DoS) and Information Disclosure (disclosing some critical heap chunk metadata, even other applications' private data).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6328", url: "https://www.suse.com/security/cve/CVE-2016-6328", }, { category: "external", summary: "SUSE Bug 1055857 for CVE-2016-6328", url: "https://bugzilla.suse.com/1055857", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-07-08T07:54:11Z", details: "moderate", }, ], title: "CVE-2016-6328", }, { cve: "CVE-2017-7544", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7544", }, ], notes: [ { category: "general", text: "libexif through 0.6.21 is vulnerable to out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c caused by improper length computation of the allocated data of an ExifMnote entry which can cause denial-of-service or possibly information disclosure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7544", url: "https://www.suse.com/security/cve/CVE-2017-7544", }, { category: "external", summary: "SUSE Bug 1059893 for CVE-2017-7544", url: "https://bugzilla.suse.com/1059893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-07-08T07:54:11Z", details: "low", }, ], title: "CVE-2017-7544", }, { cve: "CVE-2018-20030", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20030", }, ], notes: [ { category: "general", text: "An error when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EXIF tags within libexif version 0.6.21 can be exploited to exhaust available CPU resources.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20030", url: "https://www.suse.com/security/cve/CVE-2018-20030", }, { category: "external", summary: "SUSE Bug 1120943 for CVE-2018-20030", url: "https://bugzilla.suse.com/1120943", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-07-08T07:54:11Z", details: "low", }, ], title: "CVE-2018-20030", }, { cve: "CVE-2019-9278", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9278", }, ], notes: [ { category: "general", text: "In libexif, there is a possible out of bounds write due to an integer overflow. This could lead to remote escalation of privilege in the media content provider with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112537774", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9278", url: "https://www.suse.com/security/cve/CVE-2019-9278", }, { category: "external", summary: "SUSE Bug 1160770 for CVE-2019-9278", url: "https://bugzilla.suse.com/1160770", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-07-08T07:54:11Z", details: "important", }, ], title: "CVE-2019-9278", }, { cve: "CVE-2020-0093", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0093", }, ], notes: [ { category: "general", text: "In exif_data_save_data_entry of exif-data.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-148705132", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0093", url: "https://www.suse.com/security/cve/CVE-2020-0093", }, { category: "external", summary: "SUSE Bug 1171847 for CVE-2020-0093", url: "https://bugzilla.suse.com/1171847", }, { category: "external", summary: "SUSE Bug 1172116 for CVE-2020-0093", url: "https://bugzilla.suse.com/1172116", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-07-08T07:54:11Z", details: "moderate", }, ], title: "CVE-2020-0093", }, { cve: "CVE-2020-12767", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12767", }, ], notes: [ { category: "general", text: "exif_entry_get_value in exif-entry.c in libexif 0.6.21 has a divide-by-zero error.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12767", url: "https://www.suse.com/security/cve/CVE-2020-12767", }, { category: "external", summary: "SUSE Bug 1171475 for CVE-2020-12767", url: "https://bugzilla.suse.com/1171475", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-07-08T07:54:11Z", details: "moderate", }, ], title: "CVE-2020-12767", }, { cve: "CVE-2020-13112", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13112", }, ], notes: [ { category: "general", text: "An issue was discovered in libexif before 0.6.22. Several buffer over-reads in EXIF MakerNote handling could lead to information disclosure and crashes. This is different from CVE-2020-0093.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-13112", url: "https://www.suse.com/security/cve/CVE-2020-13112", }, { category: "external", summary: "SUSE Bug 1172116 for CVE-2020-13112", url: "https://bugzilla.suse.com/1172116", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-07-08T07:54:11Z", details: "critical", }, ], title: "CVE-2020-13112", }, { cve: "CVE-2020-13113", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13113", }, ], notes: [ { category: "general", text: "An issue was discovered in libexif before 0.6.22. Use of uninitialized memory in EXIF Makernote handling could lead to crashes and potential use-after-free conditions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-13113", url: "https://www.suse.com/security/cve/CVE-2020-13113", }, { category: "external", summary: "SUSE Bug 1172105 for CVE-2020-13113", url: "https://bugzilla.suse.com/1172105", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-07-08T07:54:11Z", details: "important", }, ], title: "CVE-2020-13113", }, { cve: "CVE-2020-13114", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13114", }, ], notes: [ { category: "general", text: "An issue was discovered in libexif before 0.6.22. An unrestricted size in handling Canon EXIF MakerNote data could lead to consumption of large amounts of compute time for decoding EXIF data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-13114", url: "https://www.suse.com/security/cve/CVE-2020-13114", }, { category: "external", summary: "SUSE Bug 1172121 for CVE-2020-13114", url: "https://bugzilla.suse.com/1172121", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif-devel-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP2:libexif12-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:libexif12-32bit-0.6.22-5.6.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:libexif12-32bit-0.6.22-5.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-07-08T07:54:11Z", details: "low", }, ], title: "CVE-2020-13114", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.