Linux Security
    Linux Security
    Linux Security

    Fedora 32: libexif 2020-0aa0fc1b0c

    Date 24 Nov 2020
    Posted By LinuxSecurity Advisories
    CVE-2020-0181, CVE-2020-0198, and CVE-2020-0452
    Fedora Update Notification
    2020-11-25 01:42:11.864036
    Name        : libexif
    Product     : Fedora 32
    Version     : 0.6.22
    Release     : 2.fc32
    URL         :
    Summary     : Library for extracting extra information from image files
    Description :
    Most digital cameras produce EXIF files, which are JPEG files with
    extra tags that contain information about the image. The EXIF library
    allows you to parse an EXIF file and read the data from those tags.
    Update Information:
    CVE-2020-0181, CVE-2020-0198, and CVE-2020-0452
    * Mon Nov  9 2020 Michael Catanzaro  - 0.6.22-2
    - Fix CVE-2020-0181, CVE-2020-0198, and CVE-2020-0452
      [ 1 ] Bug #1847132 - CVE-2020-0181 libexif: integer overflow in exif_data_load_data_thumbnail function in exif-data.c [fedora-all]
      [ 2 ] Bug #1847134 - CVE-2020-0198 libexif: integer overflow in exif_data_load_data_content function in exif-data.c [fedora-all]
    This update can be installed with the "dnf" update program. Use
    su -c 'dnf upgrade --advisory FEDORA-2020-0aa0fc1b0c' at the command
    line. For more information, refer to the dnf documentation available at
    All packages are signed with the Fedora Project GPG key. More details on the
    GPG keys used by the Fedora Project can be found at
    package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it.
    To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.
    Fedora Code of Conduct:
    List Guidelines:
    List Archives: email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"8","type":"x","order":"1","pct":27.59,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":20.69,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":51.72,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.