<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libexif</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:0793-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-06-11T08:33:02Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-06-11T08:33:02Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-06-11T08:33:02Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libexif</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libexif to 0.6.22 fixes the following issues:

Security issues fixed:

- CVE-2016-6328: Fixed an integer overflow in parsing MNOTE entry data of the input file (bsc#1055857).
- CVE-2017-7544: Fixed an out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c (bsc#1059893).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2020-0093: Fixed an out-of-bounds read in exif_data_save_data_entry (bsc#1171847).
- CVE-2020-12767: Fixed a divide-by-zero error in exif_entry_get_value (bsc#1171475).
- CVE-2020-13112: Fixed a time consumption DoS when parsing canon array markers (bsc#1172121).
- CVE-2020-13113: Fixed a potential use of uninitialized memory (bsc#1172105).
- CVE-2020-13114: Fixed various buffer overread fixes due to integer overflows in maker notes (bsc#1172116).

Non-security issues fixed:

- libexif was updated to version 0.6.22:
  * New translations: ms
  * Updated translations for most languages
  * Some useful EXIF 2.3 tag added:
    * EXIF_TAG_GAMMA
    * EXIF_TAG_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_IMAGE_NUMBER_OF_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_EXPOSURE_TIMES_OF_COMPOSITE_IMAGE
    * EXIF_TAG_GPS_H_POSITIONING_ERROR
    * EXIF_TAG_CAMERA_OWNER_NAME
    * EXIF_TAG_BODY_SERIAL_NUMBER
    * EXIF_TAG_LENS_SPECIFICATION
    * EXIF_TAG_LENS_MAKE
    * EXIF_TAG_LENS_MODEL
    * EXIF_TAG_LENS_SERIAL_NUMBER

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-793</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOGSCWNCJDTFI3UJ7KXEWPODU7FRDVNO/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:0793-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1055857</URL>
      <Description>SUSE Bug 1055857</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1059893</URL>
      <Description>SUSE Bug 1059893</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120943</URL>
      <Description>SUSE Bug 1120943</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1160770</URL>
      <Description>SUSE Bug 1160770</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171475</URL>
      <Description>SUSE Bug 1171475</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171847</URL>
      <Description>SUSE Bug 1171847</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172105</URL>
      <Description>SUSE Bug 1172105</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172116</URL>
      <Description>SUSE Bug 1172116</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172121</URL>
      <Description>SUSE Bug 1172121</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6328/</URL>
      <Description>SUSE CVE CVE-2016-6328 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7544/</URL>
      <Description>SUSE CVE CVE-2017-7544 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20030/</URL>
      <Description>SUSE CVE CVE-2018-20030 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9278/</URL>
      <Description>SUSE CVE CVE-2019-9278 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0093/</URL>
      <Description>SUSE CVE CVE-2020-0093 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12767/</URL>
      <Description>SUSE CVE CVE-2020-12767 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13112/</URL>
      <Description>SUSE CVE CVE-2020-13112 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13113/</URL>
      <Description>SUSE CVE CVE-2020-13113 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13114/</URL>
      <Description>SUSE CVE CVE-2020-13114 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libexif-devel-0.6.22-lp151.4.6.1">
      <FullProductName ProductID="libexif-devel-0.6.22-lp151.4.6.1">libexif-devel-0.6.22-lp151.4.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libexif-devel-32bit-0.6.22-lp151.4.6.1">
      <FullProductName ProductID="libexif-devel-32bit-0.6.22-lp151.4.6.1">libexif-devel-32bit-0.6.22-lp151.4.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libexif12-0.6.22-lp151.4.6.1">
      <FullProductName ProductID="libexif12-0.6.22-lp151.4.6.1">libexif12-0.6.22-lp151.4.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libexif12-32bit-0.6.22-lp151.4.6.1">
      <FullProductName ProductID="libexif12-32bit-0.6.22-lp151.4.6.1">libexif12-32bit-0.6.22-lp151.4.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libexif-devel-0.6.22-lp151.4.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libexif-devel-0.6.22-lp151.4.6.1">libexif-devel-0.6.22-lp151.4.6.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libexif-devel-32bit-0.6.22-lp151.4.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libexif-devel-32bit-0.6.22-lp151.4.6.1">libexif-devel-32bit-0.6.22-lp151.4.6.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libexif12-0.6.22-lp151.4.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libexif12-0.6.22-lp151.4.6.1">libexif12-0.6.22-lp151.4.6.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libexif12-32bit-0.6.22-lp151.4.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libexif12-32bit-0.6.22-lp151.4.6.1">libexif12-32bit-0.6.22-lp151.4.6.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in libexif. An integer overflow when parsing the MNOTE entry data of the input file. This can cause Denial-of-Service (DoS) and Information Disclosure (disclosing some critical heap chunk metadata, even other applications' private data).</Note>
    </Notes>
    <CVE>CVE-2016-6328</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libexif-devel-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif-devel-32bit-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-32bit-0.6.22-lp151.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOGSCWNCJDTFI3UJ7KXEWPODU7FRDVNO/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6328.html</URL>
        <Description>CVE-2016-6328</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1055857</URL>
        <Description>SUSE Bug 1055857</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libexif through 0.6.21 is vulnerable to out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c caused by improper length computation of the allocated data of an ExifMnote entry which can cause denial-of-service or possibly information disclosure.</Note>
    </Notes>
    <CVE>CVE-2017-7544</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libexif-devel-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif-devel-32bit-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-32bit-0.6.22-lp151.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOGSCWNCJDTFI3UJ7KXEWPODU7FRDVNO/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7544.html</URL>
        <Description>CVE-2017-7544</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1059893</URL>
        <Description>SUSE Bug 1059893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An error when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EXIF tags within libexif version 0.6.21 can be exploited to exhaust available CPU resources.</Note>
    </Notes>
    <CVE>CVE-2018-20030</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libexif-devel-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif-devel-32bit-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-32bit-0.6.22-lp151.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOGSCWNCJDTFI3UJ7KXEWPODU7FRDVNO/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20030.html</URL>
        <Description>CVE-2018-20030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120943</URL>
        <Description>SUSE Bug 1120943</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libexif, there is a possible out of bounds write due to an integer overflow. This could lead to remote escalation of privilege in the media content provider with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112537774</Note>
    </Notes>
    <CVE>CVE-2019-9278</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libexif-devel-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif-devel-32bit-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-32bit-0.6.22-lp151.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOGSCWNCJDTFI3UJ7KXEWPODU7FRDVNO/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9278.html</URL>
        <Description>CVE-2019-9278</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160770</URL>
        <Description>SUSE Bug 1160770</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In exif_data_save_data_entry of exif-data.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-148705132</Note>
    </Notes>
    <CVE>CVE-2020-0093</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libexif-devel-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif-devel-32bit-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-32bit-0.6.22-lp151.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOGSCWNCJDTFI3UJ7KXEWPODU7FRDVNO/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0093.html</URL>
        <Description>CVE-2020-0093</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171847</URL>
        <Description>SUSE Bug 1171847</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172116</URL>
        <Description>SUSE Bug 1172116</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">exif_entry_get_value in exif-entry.c in libexif 0.6.21 has a divide-by-zero error.</Note>
    </Notes>
    <CVE>CVE-2020-12767</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libexif-devel-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif-devel-32bit-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-32bit-0.6.22-lp151.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOGSCWNCJDTFI3UJ7KXEWPODU7FRDVNO/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12767.html</URL>
        <Description>CVE-2020-12767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171475</URL>
        <Description>SUSE Bug 1171475</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in libexif before 0.6.22. Several buffer over-reads in EXIF MakerNote handling could lead to information disclosure and crashes. This is different from CVE-2020-0093.</Note>
    </Notes>
    <CVE>CVE-2020-13112</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libexif-devel-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif-devel-32bit-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-32bit-0.6.22-lp151.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOGSCWNCJDTFI3UJ7KXEWPODU7FRDVNO/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13112.html</URL>
        <Description>CVE-2020-13112</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172116</URL>
        <Description>SUSE Bug 1172116</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in libexif before 0.6.22. Use of uninitialized memory in EXIF Makernote handling could lead to crashes and potential use-after-free conditions.</Note>
    </Notes>
    <CVE>CVE-2020-13113</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libexif-devel-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif-devel-32bit-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-32bit-0.6.22-lp151.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOGSCWNCJDTFI3UJ7KXEWPODU7FRDVNO/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13113.html</URL>
        <Description>CVE-2020-13113</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172105</URL>
        <Description>SUSE Bug 1172105</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in libexif before 0.6.22. An unrestricted size in handling Canon EXIF MakerNote data could lead to consumption of large amounts of compute time for decoding EXIF data.</Note>
    </Notes>
    <CVE>CVE-2020-13114</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libexif-devel-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif-devel-32bit-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-0.6.22-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libexif12-32bit-0.6.22-lp151.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOGSCWNCJDTFI3UJ7KXEWPODU7FRDVNO/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13114.html</URL>
        <Description>CVE-2020-13114</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172121</URL>
        <Description>SUSE Bug 1172121</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
