Hide Forgot
An issue was discovered in libexif before 0.6.22. Several buffer over-reads in EXIF MakerNote handling could lead to information disclosure and crashes. This is different from CVE-2020-0093. Reference and upstream commit: https://github.com/libexif/libexif/commit/435e21f05001fb03f9f186fa7cbc69454afd00d1
Created libexif tracking bugs for this issue: Affects: fedora-all [bug 1840345]
====Technical Summary==== The libexif library parses an EXIF tag called a MakerNote. According to the EXIF standard[1], a MakerNote tag can hold manufacturer-specific data from camera manufacturers such as Nikon, Olympus, Canon, Panasonic, etc... The vulnerable component for this flaw is in the parsing code for the MakerNotes specific to Canon, Fujifilm, Olympus, and Pentax. More precisely, the parsing code was able to read in MakerNote tag data past the end of the input buffer due to either integer overflow in multiplication, or corrupt MakerNote tags which were too short or too long. The patch (see gsuckevi's comment above) appears to check for integer overflow due to multiplication and also verify that the MakerNote tag being parsed matches the size specified in the entry structure's "components" member, as each tag can have multiple components within it. On the patch commit, Upstream notes that "Likely, this makes both commits 41bd042 and 89e5b1c redundant as it ensures that MakerNote entries are well-formed when they're populated," because those earlier commits addressed the issues on a per-component basis, whereas the patch for this flaw addresses them in the parser and is likely more robust. In summary, this flaw could be exploited if an attacker edits EXIF data in a media file to include malformed MakerNote tag data, which would cause the libexif MakerNote tag parser to perform and out-of-bounds read, potentially exposing unintended data in the process memory or causing a crash, resulting in denial of service. 1. https://www.exif.org/Exif2-2.PDF
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:2474 https://access.redhat.com/errata/RHSA-2020:2474
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-13112
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2020:2516 https://access.redhat.com/errata/RHSA-2020:2516
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:2550 https://access.redhat.com/errata/RHSA-2020:2550
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:2549 https://access.redhat.com/errata/RHSA-2020:2549
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2020:2672 https://access.redhat.com/errata/RHSA-2020:2672