Bug 1172766 (CVE-2020-0182)

Summary: VUL-1: CVE-2020-0182: libexif: buffer read overflow in exif_entry_get_value
Product: [Novell Products] SUSE Security Incidents Reporter: Wolfgang Frisch <wolfgang.frisch>
Component: IncidentsAssignee: Marcus Meissner <meissner>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Minor    
Priority: P4 - Low CC: smash_bz
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/261183/
Whiteboard: CVSSv3.1:SUSE:CVE-2020-0182:5.3:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Wolfgang Frisch 2020-06-10 08:44:09 UTC
CVE-2020-0182

In exiv2, while parsing EXIF_TAG_FOCAL_LENGTH, it was possible to read 8 bytes past the end of a heap buffer.

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0182
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-0182
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0182.html
Comment 2 Marcus Meissner 2020-06-10 08:47:06 UTC
actually libexif, not exiv2
Comment 3 Marcus Meissner 2020-06-10 08:48:15 UTC
covered in the 0.6.22 release we have pushed to SLE12 and SLE15 already.