Package "libexif"
Name: |
libexif
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- library to parse EXIF files (development files)
- library to parse EXIF files
|
Latest version: |
0.6.21-2ubuntu0.6 |
Release: |
xenial (16.04) |
Level: |
security |
Repository: |
main |
Links
Other versions of "libexif" in Xenial
Packages in group
Deleted packages are displayed in grey.
Changelog
libexif (0.6.21-2ubuntu0.6) xenial-security; urgency=medium
* SECURITY UPDATE: Buffer overflow
- debian/patches/CVE-2020-0452.patch: fixed a incorrect overflow check that could be
optimized away in libexif/exif-entry.c.
- CVE-2020-0452
-- <email address hidden> (Leonidas S. Barbosa) Fri, 06 Nov 2020 12:02:37 -0300
|
Source diff to previous version |
|
libexif (0.6.21-2ubuntu0.5) xenial-security; urgency=medium
* SECURITY UPDATE: Out of bounds read
- debian/patches/CVE-2020-0093.patch: fix read
buffer overflow making sure the number of bytes being
copied from does not exceed the source buffer size in
libexif/exif-data.c.
- CVE-2020-0093
* SECURITY UPDATE: Out of bounds read
- debian/patches/CVE-2020-13112.patch: fix MakerNote tag size
overflow check for a size overflow while reading tags in
libexif/canon/exif-mnote-data-canon.c,
libexif/fuji/exif/mnote-data-fuji.c,
libexif/olympus/exif-mnote-data-olympus.c,
libexif/pentax/exif-mnote-data-pentax.c.
- CVE-2020-13112
* SECURITY UPDATE: Possibly crash and potential use-after-free
- debian/patches/CVE-2020-13113.patch: ensures that an uninitialized
pointer is not dereferenced later in the case where the number of
components is 0 in libexif/canon/exif-mnote-data-canon.c,
libexif/fuji/exif-mnote-data-fuji.c,
libexif/olympus/exif-mnote-data-olympus.c,
libexif/pentax/exif-mnote-data-pentax.
- CVE-2020-13113
* SECURITY UPDATE: Denial of service
- debian/patches/CVE-2020-13114.patch: add a failsafe on the
maximum number of Canon MakerNote subtags in
libexif/canon/exif-mnote-data-canon.c.
- CVE-2020-13114
* SECURITY UPDATE: Out of bounds read
- debian/patches/CVE-2020-0182.patch: fix a buffer read
overflow in exif_entry_get_value in libexif/exif-entry.c.
- CVE-2020-0182
* SECURITY UPDATE: Integer overflow
- debian/patches/CVE-2020-0198.patch: fix unsigned integer overflow
in libexif/exif-data.c.
- CVE-2020-0198
-- <email address hidden> (Leonidas S. Barbosa) Tue, 09 Jun 2020 09:34:38 -0300
|
Source diff to previous version |
CVE-2020-0093 |
In exif_data_save_data_entry of exif-data.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local informati |
CVE-2020-13112 |
An issue was discovered in libexif before 0.6.22. Several buffer over-reads in EXIF MakerNote handling could lead to information disclosure and crash |
CVE-2020-13113 |
An issue was discovered in libexif before 0.6.22. Use of uninitialized memory in EXIF Makernote handling could lead to crashes and potential use-afte |
CVE-2020-13114 |
An issue was discovered in libexif before 0.6.22. An unrestricted size in handling Canon EXIF MakerNote data could lead to consumption of large amoun |
CVE-2020-0182 |
In exif_entry_get_value of exif-entry.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information d |
CVE-2020-0198 |
In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of servic |
|
libexif (0.6.21-2ubuntu0.2) xenial-security; urgency=medium
* SECURITY UPDATE: Denial of service
- debian/patches/CVE-2018-20030.patch: improve deep recursion detection
in exif_data_load_data_content in libexif/exif-data.c.
- CVE-2018-20030
* SECURITY UPDATE: Divinding by zero vulnerability
- debian/patches/CVE-2020-12767.patch: check if d variable is not zeroed
before use it in libexif/exif-entry.c
- CVE-2020-12767
-- <email address hidden> (Leonidas S. Barbosa) Mon, 11 May 2020 13:13:09 -0300
|
Source diff to previous version |
CVE-2018-20030 |
An error when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EXIF tags within libexif version 0.6.21 can be exploited to exhaust available CPU |
CVE-2020-12767 |
exif_entry_get_value in exif-entry.c in libexif 0.6.21 has a divide-by-zero error. |
|
libexif (0.6.21-2ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: Integer overflow
- debian/patches/CVE-2016-6328.patch: fix int overflow while parsing
MNOTE entry data of the input file in
libexif/pentax/mnote-pentax-entry.c
- CVE-2016-6328
* SECURITY UPDATE: Out-bouns heap read and denial of service
- debian/patches/CVE-2017-7544.patch: fixes out-of-bounds heap read
in exif_data_save_data_entry function in libexif/exif-data.c.
- CVE-2017-7544
* SECURITY UPDATE: Out of bounds write
- debian/patches/CVE-2019-9278.patch: avoid the use of unsafe int overflow
checking constructs and check for the actual sizes to avoid integer
overflows in libexif/exif-data.c.
- CVE-2019-9278
-- <email address hidden> (Leonidas S. Barbosa) Tue, 11 Feb 2020 09:10:54 -0300
|
CVE-2016-6328 |
A vulnerability was found in libexif. An integer overflow when parsing the MNOTE entry data of the input file. This can cause Denial-of-Service (DoS) |
CVE-2017-7544 |
libexif through 0.6.21 is vulnerable to out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c caused by |
CVE-2019-9278 |
In libexif, there is a possible out of bounds write due to an integer overflow. This could lead to remote escalation of privilege in the media conten |
|
About
-
Send Feedback to @ubuntu_updates