-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: libexif security update
Advisory ID:       RHSA-2020:2672-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:2672
Issue date:        2020-06-23
CVE Names:         CVE-2020-13112 
====================================================================
1. Summary:

An update for libexif is now available for Red Hat Enterprise Linux 8.1
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat CodeReady Linux Builder EUS (v. 8.1) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux AppStream EUS (v. 8.1) - aarch64, ppc64le, s390x, x86_64

3. Description:

The libexif packages provide a library for extracting extra information
from image files.

Security Fix(es):

* libexif: several buffer over-reads in EXIF MakerNote handling can lead to
information disclosure and DoS (CVE-2020-13112)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1840344 - CVE-2020-13112 libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS

6. Package List:

Red Hat Enterprise Linux AppStream EUS (v. 8.1):

Source:
libexif-0.6.21-17.el8_1.src.rpm

aarch64:
libexif-0.6.21-17.el8_1.aarch64.rpm
libexif-debuginfo-0.6.21-17.el8_1.aarch64.rpm
libexif-debugsource-0.6.21-17.el8_1.aarch64.rpm

ppc64le:
libexif-0.6.21-17.el8_1.ppc64le.rpm
libexif-debuginfo-0.6.21-17.el8_1.ppc64le.rpm
libexif-debugsource-0.6.21-17.el8_1.ppc64le.rpm

s390x:
libexif-0.6.21-17.el8_1.s390x.rpm
libexif-debuginfo-0.6.21-17.el8_1.s390x.rpm
libexif-debugsource-0.6.21-17.el8_1.s390x.rpm

x86_64:
libexif-0.6.21-17.el8_1.i686.rpm
libexif-0.6.21-17.el8_1.x86_64.rpm
libexif-debuginfo-0.6.21-17.el8_1.i686.rpm
libexif-debuginfo-0.6.21-17.el8_1.x86_64.rpm
libexif-debugsource-0.6.21-17.el8_1.i686.rpm
libexif-debugsource-0.6.21-17.el8_1.x86_64.rpm

Red Hat CodeReady Linux Builder EUS (v. 8.1):

aarch64:
libexif-debuginfo-0.6.21-17.el8_1.aarch64.rpm
libexif-debugsource-0.6.21-17.el8_1.aarch64.rpm
libexif-devel-0.6.21-17.el8_1.aarch64.rpm

ppc64le:
libexif-debuginfo-0.6.21-17.el8_1.ppc64le.rpm
libexif-debugsource-0.6.21-17.el8_1.ppc64le.rpm
libexif-devel-0.6.21-17.el8_1.ppc64le.rpm

s390x:
libexif-debuginfo-0.6.21-17.el8_1.s390x.rpm
libexif-debugsource-0.6.21-17.el8_1.s390x.rpm
libexif-devel-0.6.21-17.el8_1.s390x.rpm

x86_64:
libexif-debuginfo-0.6.21-17.el8_1.i686.rpm
libexif-debuginfo-0.6.21-17.el8_1.x86_64.rpm
libexif-debugsource-0.6.21-17.el8_1.i686.rpm
libexif-debugsource-0.6.21-17.el8_1.x86_64.rpm
libexif-devel-0.6.21-17.el8_1.i686.rpm
libexif-devel-0.6.21-17.el8_1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-13112
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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TGBd
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-2672:01 Moderate: libexif security update

An update for libexif is now available for Red Hat Enterprise Linux 8.1 Extended Update Support

Summary

The libexif packages provide a library for extracting extra information from image files.
Security Fix(es):
* libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS (CVE-2020-13112)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2020-13112 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat Enterprise Linux AppStream EUS (v. 8.1):
Source: libexif-0.6.21-17.el8_1.src.rpm
aarch64: libexif-0.6.21-17.el8_1.aarch64.rpm libexif-debuginfo-0.6.21-17.el8_1.aarch64.rpm libexif-debugsource-0.6.21-17.el8_1.aarch64.rpm
ppc64le: libexif-0.6.21-17.el8_1.ppc64le.rpm libexif-debuginfo-0.6.21-17.el8_1.ppc64le.rpm libexif-debugsource-0.6.21-17.el8_1.ppc64le.rpm
s390x: libexif-0.6.21-17.el8_1.s390x.rpm libexif-debuginfo-0.6.21-17.el8_1.s390x.rpm libexif-debugsource-0.6.21-17.el8_1.s390x.rpm
x86_64: libexif-0.6.21-17.el8_1.i686.rpm libexif-0.6.21-17.el8_1.x86_64.rpm libexif-debuginfo-0.6.21-17.el8_1.i686.rpm libexif-debuginfo-0.6.21-17.el8_1.x86_64.rpm libexif-debugsource-0.6.21-17.el8_1.i686.rpm libexif-debugsource-0.6.21-17.el8_1.x86_64.rpm
Red Hat CodeReady Linux Builder EUS (v. 8.1):
aarch64: libexif-debuginfo-0.6.21-17.el8_1.aarch64.rpm libexif-debugsource-0.6.21-17.el8_1.aarch64.rpm libexif-devel-0.6.21-17.el8_1.aarch64.rpm
ppc64le: libexif-debuginfo-0.6.21-17.el8_1.ppc64le.rpm libexif-debugsource-0.6.21-17.el8_1.ppc64le.rpm libexif-devel-0.6.21-17.el8_1.ppc64le.rpm
s390x: libexif-debuginfo-0.6.21-17.el8_1.s390x.rpm libexif-debugsource-0.6.21-17.el8_1.s390x.rpm libexif-devel-0.6.21-17.el8_1.s390x.rpm
x86_64: libexif-debuginfo-0.6.21-17.el8_1.i686.rpm libexif-debuginfo-0.6.21-17.el8_1.x86_64.rpm libexif-debugsource-0.6.21-17.el8_1.i686.rpm libexif-debugsource-0.6.21-17.el8_1.x86_64.rpm libexif-devel-0.6.21-17.el8_1.i686.rpm libexif-devel-0.6.21-17.el8_1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2020:2672-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:2672
Issued Date: : 2020-06-23
CVE Names: CVE-2020-13112

Topic

An update for libexif is now available for Red Hat Enterprise Linux 8.1Extended Update Support.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat CodeReady Linux Builder EUS (v. 8.1) - aarch64, ppc64le, s390x, x86_64

Red Hat Enterprise Linux AppStream EUS (v. 8.1) - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

1840344 - CVE-2020-13112 libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS


Related News