{"schema_version":"1.7.2","id":"OESA-2022-2006","modified":"2022-10-21T11:04:26Z","published":"2022-10-21T11:04:26Z","upstream":["CVE-2019-9278","CVE-2020-0093","CVE-2020-0181","CVE-2020-0198"],"summary":"libexif security update","details":"Most digital cameras produce EXIF files, which are JPEG files with extra tags that contain information about the image. The EXIF library allows you to parse an EXIF file and read the data from those tags.\r\n\r\n\r\n\r\nSecurity Fix(es):\r\n\r\nIn libexif, there is a possible out of bounds write due to an integer overflow. This could lead to remote escalation of privilege in the media content provider with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112537774(CVE-2019-9278)\r\n\r\nIn exif_data_save_data_entry of exif-data.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-148705132(CVE-2020-0093)\r\n\r\nIn exif_data_load_data_thumbnail of exif-data.c, there is a possible denial of service due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145075076(CVE-2020-0181)\r\n\r\nIn exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146428941(CVE-2020-0198)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"libexif","purl":"pkg:rpm/openEuler/libexif\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.6.21-25.oe1"}]}],"ecosystem_specific":{"aarch64":["libexif-debuginfo-0.6.21-25.oe1.aarch64.rpm","libexif-debugsource-0.6.21-25.oe1.aarch64.rpm","libexif-devel-0.6.21-25.oe1.aarch64.rpm","libexif-0.6.21-25.oe1.aarch64.rpm"],"noarch":["libexif-help-0.6.21-25.oe1.noarch.rpm"],"src":["libexif-0.6.21-25.oe1.src.rpm"],"x86_64":["libexif-debuginfo-0.6.21-25.oe1.x86_64.rpm","libexif-devel-0.6.21-25.oe1.x86_64.rpm","libexif-0.6.21-25.oe1.x86_64.rpm","libexif-debugsource-0.6.21-25.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2006"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9278"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0093"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0181"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0198"}],"database_specific":{"severity":"High"}}