Debian LTS: DLA-2222-1: libexif security update

    Date 28 May 2020
    174
    Posted By LinuxSecurity Advisories
    Various minor vulnerabilities have been addredd in libexif, a library to parse EXIF metadata files.
    Package        : libexif
    Version        : 0.6.21-2+deb8u3
    CVE ID         : CVE-2018-20030 CVE-2020-13112 CVE-2020-13113 CVE-2020-13114
    Debian Bug     : 918730 961407 961409 961410
    
    
    Various minor vulnerabilities have been addredd in libexif, a library to
    parse EXIF metadata files.
    
    CVE-2018-20030
    
        This issue had already been addressed via DLA-2214-1. However, upstream
        provided an updated patch, so this has been followed up on.
    
    CVE-2020-13112
    
        Several buffer over-reads in EXIF MakerNote handling could have lead
        to information disclosure and crashes. This issue is different from
        already resolved CVE-2020-0093.
    
    CVE-2020-13113
    
        Use of uninitialized memory in EXIF Makernote handling could have
        lead to crashes and potential use-after-free conditions.
    
    CVE-2020-13114
    
        An unrestricted size in handling Canon EXIF MakerNote data could have
        lead to consumption of large amounts of compute time for decoding
        EXIF data.
    
    For Debian 8 "Jessie", these problems have been fixed in version
    0.6.21-2+deb8u3.
    
    We recommend that you upgrade your libexif packages.
    
    Further information about Debian LTS security advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://wiki.debian.org/LTS
    
    -- 
    
    mike gabriel aka sunweaver (Debian Developer)
    fon: +49 (1520) 1976 148
    
    GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
    mail: This email address is being protected from spambots. You need JavaScript enabled to view it., https://sunweavers.net
    
    

    LinuxSecurity Poll

    How do you feel about the elimination of the terms 'blacklist' and 'slave' from the Linux kernel?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/32-how-do-you-feel-about-the-elimination-of-the-terms-blacklist-and-slave-from-the-linux-kernel?task=poll.vote&format=json
    32
    radio
    [{"id":"112","title":"I strongly support this change - racially charged language should not be used in the code and documentation of the kernel and other open-source projects.","votes":"3","type":"x","order":"1","pct":42.86,"resources":[]},{"id":"113","title":"I'm indifferent - this small change will not affect broader issues of racial insensitivity and white privilege.","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"114","title":"I'm opposed to this change - there is no need to change language that has been used for years. It doesn't make sense for people to take offense to terminology used in community projects.","votes":"2","type":"x","order":"3","pct":28.57,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.