-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: libexif security update
Advisory ID:       RHSA-2020:5402-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:5402
Issue date:        2020-12-14
CVE Names:         CVE-2020-0452 
====================================================================
1. Summary:

An update for libexif is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

3. Description:

The libexif packages provide a library for extracting extra information
from image files.

Security Fix(es):

* libexif: out of bounds write due to an integer overflow in exif-entry.c
(CVE-2020-0452)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1902004 - CVE-2020-0452 libexif: out of bounds write due to an integer overflow in exif-entry.c

6. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source:
libexif-0.6.22-2.el7_9.src.rpm

x86_64:
libexif-0.6.22-2.el7_9.i686.rpm
libexif-0.6.22-2.el7_9.x86_64.rpm
libexif-debuginfo-0.6.22-2.el7_9.i686.rpm
libexif-debuginfo-0.6.22-2.el7_9.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64:
libexif-debuginfo-0.6.22-2.el7_9.i686.rpm
libexif-debuginfo-0.6.22-2.el7_9.x86_64.rpm
libexif-devel-0.6.22-2.el7_9.i686.rpm
libexif-devel-0.6.22-2.el7_9.x86_64.rpm
libexif-doc-0.6.22-2.el7_9.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

Source:
libexif-0.6.22-2.el7_9.src.rpm

x86_64:
libexif-0.6.22-2.el7_9.i686.rpm
libexif-0.6.22-2.el7_9.x86_64.rpm
libexif-debuginfo-0.6.22-2.el7_9.i686.rpm
libexif-debuginfo-0.6.22-2.el7_9.x86_64.rpm
libexif-devel-0.6.22-2.el7_9.i686.rpm
libexif-devel-0.6.22-2.el7_9.x86_64.rpm
libexif-doc-0.6.22-2.el7_9.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
libexif-0.6.22-2.el7_9.src.rpm

ppc64:
libexif-0.6.22-2.el7_9.ppc.rpm
libexif-0.6.22-2.el7_9.ppc64.rpm
libexif-debuginfo-0.6.22-2.el7_9.ppc.rpm
libexif-debuginfo-0.6.22-2.el7_9.ppc64.rpm

ppc64le:
libexif-0.6.22-2.el7_9.ppc64le.rpm
libexif-debuginfo-0.6.22-2.el7_9.ppc64le.rpm

s390x:
libexif-0.6.22-2.el7_9.s390.rpm
libexif-0.6.22-2.el7_9.s390x.rpm
libexif-debuginfo-0.6.22-2.el7_9.s390.rpm
libexif-debuginfo-0.6.22-2.el7_9.s390x.rpm

x86_64:
libexif-0.6.22-2.el7_9.i686.rpm
libexif-0.6.22-2.el7_9.x86_64.rpm
libexif-debuginfo-0.6.22-2.el7_9.i686.rpm
libexif-debuginfo-0.6.22-2.el7_9.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64:
libexif-debuginfo-0.6.22-2.el7_9.ppc.rpm
libexif-debuginfo-0.6.22-2.el7_9.ppc64.rpm
libexif-devel-0.6.22-2.el7_9.ppc.rpm
libexif-devel-0.6.22-2.el7_9.ppc64.rpm
libexif-doc-0.6.22-2.el7_9.ppc64.rpm

ppc64le:
libexif-debuginfo-0.6.22-2.el7_9.ppc64le.rpm
libexif-devel-0.6.22-2.el7_9.ppc64le.rpm
libexif-doc-0.6.22-2.el7_9.ppc64le.rpm

s390x:
libexif-debuginfo-0.6.22-2.el7_9.s390.rpm
libexif-debuginfo-0.6.22-2.el7_9.s390x.rpm
libexif-devel-0.6.22-2.el7_9.s390.rpm
libexif-devel-0.6.22-2.el7_9.s390x.rpm
libexif-doc-0.6.22-2.el7_9.s390x.rpm

x86_64:
libexif-debuginfo-0.6.22-2.el7_9.i686.rpm
libexif-debuginfo-0.6.22-2.el7_9.x86_64.rpm
libexif-devel-0.6.22-2.el7_9.i686.rpm
libexif-devel-0.6.22-2.el7_9.x86_64.rpm
libexif-doc-0.6.22-2.el7_9.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
libexif-0.6.22-2.el7_9.src.rpm

x86_64:
libexif-0.6.22-2.el7_9.i686.rpm
libexif-0.6.22-2.el7_9.x86_64.rpm
libexif-debuginfo-0.6.22-2.el7_9.i686.rpm
libexif-debuginfo-0.6.22-2.el7_9.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64:
libexif-debuginfo-0.6.22-2.el7_9.i686.rpm
libexif-debuginfo-0.6.22-2.el7_9.x86_64.rpm
libexif-devel-0.6.22-2.el7_9.i686.rpm
libexif-devel-0.6.22-2.el7_9.x86_64.rpm
libexif-doc-0.6.22-2.el7_9.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-0452
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBX9dpn9zjgjWX9erEAQht0w/9HR0DVRpwtsONRfjT+29jBWvdwUIHvWUM
BNfRAZg1ngeha5p3OC12dE0s3gckFrccT7iH6wbo9uRSlM8dHY6OLOZyu9kVWX81
VCEHLFrJHs27HdWItC2CCOkHeWAUylNHgSWyfRHvr6SNjIlkLF0RueTSqbvvNeDv
Z3T/ZpGOz38rcJ4+g+p6LC8JWiqJGSBXk0bC0wUszKVhGdmq9ZsyxbrEIndNR2Yu
xfHEYtgGSVOSCFW26nY/1VQwW2hJWYjdML9HmRXs4fv3YpWlKQhpPOcIhVbq4FP/
vRzjMDfhV3OoFGrCrtikLFWdM0owgAYlTjhJ/rFQmeCYIt/GBpZ7Vi2vONiKGRiM
z0v5XFzFVROcvqJijpu2/5Wab2hI8NNb2BnXqBfJ5YiIE9ZEKue7cuRZbTf2kOIv
taHdX2hc0MM2cvTEF2Pen/2pcKlf3YEmVZ0dhlKLX9kmJPghNbR3HFQOtxn9kwEG
fymatLQ2dJvTV/edEva1QdWbC62ijLyo5Fwv+VPy1rRjmp/53ESWy2moTSnd9T0V
Csi06GFadotiHSJ0Nuo1WSh0is/5KHc0TSNLmXUVViBRu8ILSiX+so4iN+ig7PP3
MRVD2qsujdPYzWb1ZrGjJO+wmwLG7xwVFCHnftE2qjFCMKvQ9Ga2BR+K4pFQ8mbq
PEyJGHn13mg=6q3S
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-5402:01 Important: libexif security update

An update for libexif is now available for Red Hat Enterprise Linux 7

Summary

The libexif packages provide a library for extracting extra information from image files.
Security Fix(es):
* libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2020-0452 https://access.redhat.com/security/updates/classification/#important

Package List

Red Hat Enterprise Linux Client (v. 7):
Source: libexif-0.6.22-2.el7_9.src.rpm
x86_64: libexif-0.6.22-2.el7_9.i686.rpm libexif-0.6.22-2.el7_9.x86_64.rpm libexif-debuginfo-0.6.22-2.el7_9.i686.rpm libexif-debuginfo-0.6.22-2.el7_9.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: libexif-debuginfo-0.6.22-2.el7_9.i686.rpm libexif-debuginfo-0.6.22-2.el7_9.x86_64.rpm libexif-devel-0.6.22-2.el7_9.i686.rpm libexif-devel-0.6.22-2.el7_9.x86_64.rpm libexif-doc-0.6.22-2.el7_9.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
Source: libexif-0.6.22-2.el7_9.src.rpm
x86_64: libexif-0.6.22-2.el7_9.i686.rpm libexif-0.6.22-2.el7_9.x86_64.rpm libexif-debuginfo-0.6.22-2.el7_9.i686.rpm libexif-debuginfo-0.6.22-2.el7_9.x86_64.rpm libexif-devel-0.6.22-2.el7_9.i686.rpm libexif-devel-0.6.22-2.el7_9.x86_64.rpm libexif-doc-0.6.22-2.el7_9.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: libexif-0.6.22-2.el7_9.src.rpm
ppc64: libexif-0.6.22-2.el7_9.ppc.rpm libexif-0.6.22-2.el7_9.ppc64.rpm libexif-debuginfo-0.6.22-2.el7_9.ppc.rpm libexif-debuginfo-0.6.22-2.el7_9.ppc64.rpm
ppc64le: libexif-0.6.22-2.el7_9.ppc64le.rpm libexif-debuginfo-0.6.22-2.el7_9.ppc64le.rpm
s390x: libexif-0.6.22-2.el7_9.s390.rpm libexif-0.6.22-2.el7_9.s390x.rpm libexif-debuginfo-0.6.22-2.el7_9.s390.rpm libexif-debuginfo-0.6.22-2.el7_9.s390x.rpm
x86_64: libexif-0.6.22-2.el7_9.i686.rpm libexif-0.6.22-2.el7_9.x86_64.rpm libexif-debuginfo-0.6.22-2.el7_9.i686.rpm libexif-debuginfo-0.6.22-2.el7_9.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: libexif-debuginfo-0.6.22-2.el7_9.ppc.rpm libexif-debuginfo-0.6.22-2.el7_9.ppc64.rpm libexif-devel-0.6.22-2.el7_9.ppc.rpm libexif-devel-0.6.22-2.el7_9.ppc64.rpm libexif-doc-0.6.22-2.el7_9.ppc64.rpm
ppc64le: libexif-debuginfo-0.6.22-2.el7_9.ppc64le.rpm libexif-devel-0.6.22-2.el7_9.ppc64le.rpm libexif-doc-0.6.22-2.el7_9.ppc64le.rpm
s390x: libexif-debuginfo-0.6.22-2.el7_9.s390.rpm libexif-debuginfo-0.6.22-2.el7_9.s390x.rpm libexif-devel-0.6.22-2.el7_9.s390.rpm libexif-devel-0.6.22-2.el7_9.s390x.rpm libexif-doc-0.6.22-2.el7_9.s390x.rpm
x86_64: libexif-debuginfo-0.6.22-2.el7_9.i686.rpm libexif-debuginfo-0.6.22-2.el7_9.x86_64.rpm libexif-devel-0.6.22-2.el7_9.i686.rpm libexif-devel-0.6.22-2.el7_9.x86_64.rpm libexif-doc-0.6.22-2.el7_9.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: libexif-0.6.22-2.el7_9.src.rpm
x86_64: libexif-0.6.22-2.el7_9.i686.rpm libexif-0.6.22-2.el7_9.x86_64.rpm libexif-debuginfo-0.6.22-2.el7_9.i686.rpm libexif-debuginfo-0.6.22-2.el7_9.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: libexif-debuginfo-0.6.22-2.el7_9.i686.rpm libexif-debuginfo-0.6.22-2.el7_9.x86_64.rpm libexif-devel-0.6.22-2.el7_9.i686.rpm libexif-devel-0.6.22-2.el7_9.x86_64.rpm libexif-doc-0.6.22-2.el7_9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2020:5402-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:5402
Issued Date: : 2020-12-14
CVE Names: CVE-2020-0452

Topic

An update for libexif is now available for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux Client (v. 7) - x86_64

Red Hat Enterprise Linux Client Optional (v. 7) - x86_64

Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64

Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64

Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64

Red Hat Enterprise Linux Workstation (v. 7) - x86_64

Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64


Bugs Fixed

1902004 - CVE-2020-0452 libexif: out of bounds write due to an integer overflow in exif-entry.c


Related News