Bug 26622 - libexif new security issue CVE-2020-12767
Summary: libexif new security issue CVE-2020-12767
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal major
Target Milestone: ---
Assignee: Nicolas Lécureuil
QA Contact: Sec team
URL:
Whiteboard:
Keywords:
Depends on: 26650
Blocks:
  Show dependency treegraph
 
Reported: 2020-05-14 22:29 CEST by David Walser
Modified: 2020-05-27 21:16 CEST (History)
5 users (show)

See Also:
Source RPM: libexif-0.6.21-16.mga8.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2020-05-14 22:29:24 CEST
Ubuntu has issued an advisory on May 13:
https://usn.ubuntu.com/4358-1/

Mageia 7 is also affected.
David Walser 2020-05-14 22:29:37 CEST

Whiteboard: (none) => MGA7TOO

Comment 1 Lewis Smith 2020-05-15 09:15:45 CEST
No evident maintainer for this, so having to assign it globally.

Assignee: bugsquad => pkg-bugs

Comment 2 Nicolas Lécureuil 2020-05-17 15:50:36 CEST
Fix pushed into cauldron.

CC: (none) => mageia
Version: Cauldron => 7
Whiteboard: MGA7TOO => (none)

Comment 3 Nicolas Lécureuil 2020-05-17 16:31:16 CEST
Pushed in updates testing.

Advisory:
========================

A new version of libexif.
It fixes CVE-2020-12767

Updated packages in core/updates_testing:
========================
libexif12-common-0.6.21-14.2.mga7
libexif12-0.6.21-14.2.mga7
libexif-devel-0.6.21-14.2.mga7
libexif-debugsource-0.6.21-14.2.mga7
libexif12-debuginfo-0.6.21-14.2.mga7


from: libexif-0.6.21-14.2.mga7

Assignee: pkg-bugs => qa-bugs
Status: NEW => ASSIGNED

Comment 4 David Walser 2020-05-17 19:30:28 CEST
Advisory:
========================

Updated libexif packages fix security vulnerability:

exif_entry_get_value in exif-entry.c in libexif 0.6.21 has a divide-by-zero
error (CVE-2020-12767).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12767
https://usn.ubuntu.com/4358-1/
Comment 5 Len Lawrence 2020-05-18 19:09:09 CEST
mga7, x86_64

A reproducer is listed against CVE-2020-12767 at https://github.com/libexif/libexif/issues/31 but it involves building a "fuzzer" using "infra/helper.py".  There are several instances of helper.py scripts on the system - which one?  This is a little outside QA's remit.

The package was already installed.  The library is used by a large number of packages including exif, caja, darktable, eom/eog, geequie, feh, ristretto and tellico.  Those examples have been used on a number of occasions without any problems.

Updated the packages.
$ rpm -qa | grep exif
lib64exif-devel-0.6.21-14.2.mga7
lib64exif12-0.6.21-14.2.mga7
libexif12-common-0.6.21-14.2.mga7

$ strace -o exif.trace exif LairigGhru_8.jpg
EXIF tags in 'LairigGhru_8.jpg' ('Motorola' byte order):
--------------------+----------------------------------------------------------
Tag                 |Value
--------------------+----------------------------------------------------------
Image Description   |                               
Manufacturer        |SONY
Model               |DSC-HX1
Orientation         |Top-left
Software            |Adobe Photoshop CS4 Windows
.............

$ grep exif exif.trace
openat(AT_FDCWD, "/lib64/libexif.so.12", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/share/locale/en_GB.UTF-8/LC_MESSAGES/exif.mo", O_RDONLY) 

Browsed images:
$ strace -o astro.trace ristretto /data/astro
$ grep exif astro.trace
openat(AT_FDCWD, "/lib64/libexif.so.12", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib64/libexif.so.12.3.3", O_RDONLY) = 3
$ strace -o eom.trace eom *.png
$ grep exif eom.trace
openat(AT_FDCWD, "/lib64/libexif.so.12", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib64/libexif.so.12.3.3", O_RDONLY) = 3

No regressions.

Whiteboard: (none) => MGA7-64-OK
CC: (none) => tarazed25

Comment 6 Thomas Andrews 2020-05-19 00:33:49 CEST
Validating. Assuming the advisory in Comment 4 is the more correct.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Comment 7 Dan Fandrich 2020-05-21 12:40:38 CEST
I really suggest upgrading to libexif 0.6.22 instead of trying to patch 0.6.21. I count patches for 6 CVEs in svn right now while 9 were announced for 0.6.22. There were also some changes in 0.6.22 that may have had security implications but didn't get a CVE. The newer version is highly compatible with the older one, although there are some minor output formatting differences that are more likely to affect test suites than anything else.

CC: (none) => dan

David Walser 2020-05-21 14:17:31 CEST

Depends on: (none) => 26650

Comment 8 David Walser 2020-05-21 14:19:17 CEST
libexif update moved to Bug 26650.

Whiteboard: MGA7-64-OK => (none)
Keywords: validated_update => (none)
CC: sysadmin-bugs => qa-bugs
Assignee: qa-bugs => mageia

Comment 9 Nicolas Lécureuil 2020-05-22 01:40:59 CEST
should we close this one dupplicate of https://bugs.mageia.org/show_bug.cgi?id=26650 ?
Nicolas Lécureuil 2020-05-22 01:41:13 CEST

Assignee: mageia => qa-bugs

Comment 10 David Walser 2020-05-22 01:48:08 CEST
No, but we can only have one bug assigned to QA.

Assignee: qa-bugs => mageia

Comment 11 David Walser 2020-05-27 21:16:56 CEST
Fixed in:
https://advisories.mageia.org/MGASA-2020-0238.html

Status: ASSIGNED => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.