Package: release.debian.org Severity: normal Tags: stretch User: release.debian....@packages.debian.org Usertags: pu
libexif 0.6.21-2+deb9u1 contains five security vulnerabilities currently marked as "no DSA". The attached debdiff fixes these vulnerabilities. CVE-2020-12767 - division-by-zero errors CVE-2020-0093 - read buffer overflow CVE-2018-20030 - denial of service by wasting CPU CVE-2017-7544 - out-of-bounds heap read CVE-2016-6328 - integer overflow -- System Information: Debian Release: bullseye/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.6.0-1-amd64 (SMP w/2 CPU cores) Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8), LANGUAGE=en_AU:en (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash
diff -Nru libexif-0.6.21/debian/changelog libexif-0.6.21/debian/changelog --- libexif-0.6.21/debian/changelog 2020-02-02 07:54:38.000000000 +1100 +++ libexif-0.6.21/debian/changelog 2020-05-19 18:41:18.000000000 +1000 @@ -1,3 +1,19 @@ +libexif (0.6.21-2+deb9u2) stretch; urgency=medium + + * Team upload. + * Add upstream patches to fix multiple security issues: + - cve-2016-6328.patch: Fix an integer overflow while parsing the MNOTE + entry data of the input file (CVE-2016-6328) (Closes: #873022). + - cve-2017-7544.patch: Fix an out-of-bounds heap read in the function + exif_data_save_data_entry() (CVE-2017-7544) (Closes: #876466). + - cve-2018-20030.patch: Improve deep recursion detection in the function + exif_data_load_data_content() (CVE-2018-20030) (Closes: #918730). + - cve-2020-12767.patch: Prevent some possible division-by-zero errors + in exif_entry_get_value() (CVE-2020-12767) (Closes: #960199). + - cve-2020-0093.patch: Prevent read buffer overflow (CVE-2020-0093). + + -- Hugh McMaster <hugh.mcmas...@outlook.com> Tue, 19 May 2020 19:40:10 +1000 + libexif (0.6.21-2+deb9u1) stretch-security; urgency=high * Non-maintainer upload by the Security Team. diff -Nru libexif-0.6.21/debian/patches/cve-2016-6328.patch libexif-0.6.21/debian/patches/cve-2016-6328.patch --- libexif-0.6.21/debian/patches/cve-2016-6328.patch 1970-01-01 10:00:00.000000000 +1000 +++ libexif-0.6.21/debian/patches/cve-2016-6328.patch 2020-05-19 18:36:53.000000000 +1000 @@ -0,0 +1,53 @@ +Description: Fixes an integer overflow while parsing the MNOTE entry data of the input file (CVE-2016-6328) +Author: Marcus Meissner <mar...@jet.franken.de> +Bug-Debian: http://bugs.debian.org/873022 +Last-Update: 2017-07-25 + +Index: libexif-0.6.21/libexif/pentax/mnote-pentax-entry.c +=================================================================== +--- libexif-0.6.21.orig/libexif/pentax/mnote-pentax-entry.c ++++ libexif-0.6.21/libexif/pentax/mnote-pentax-entry.c +@@ -425,24 +425,34 @@ mnote_pentax_entry_get_value (MnotePenta + case EXIF_FORMAT_SHORT: + { + const unsigned char *data = entry->data; +- size_t k, len = strlen(val); ++ size_t k, len = strlen(val), sizeleft; ++ ++ sizeleft = entry->size; + for(k=0; k<entry->components; k++) { ++ if (sizeleft < 2) ++ break; + vs = exif_get_short (data, entry->order); + snprintf (val+len, maxlen-len, "%i ", vs); + len = strlen(val); + data += 2; ++ sizeleft -= 2; + } + } + break; + case EXIF_FORMAT_LONG: + { + const unsigned char *data = entry->data; +- size_t k, len = strlen(val); ++ size_t k, len = strlen(val), sizeleft; ++ ++ sizeleft = entry->size; + for(k=0; k<entry->components; k++) { ++ if (sizeleft < 4) ++ break; + vl = exif_get_long (data, entry->order); + snprintf (val+len, maxlen-len, "%li", (long int) vl); + len = strlen(val); + data += 4; ++ sizeleft -= 4; + } + } + break; +@@ -455,5 +465,5 @@ mnote_pentax_entry_get_value (MnotePenta + break; + } + +- return (val); ++ return val; + } diff -Nru libexif-0.6.21/debian/patches/cve-2017-7544.patch libexif-0.6.21/debian/patches/cve-2017-7544.patch --- libexif-0.6.21/debian/patches/cve-2017-7544.patch 1970-01-01 10:00:00.000000000 +1000 +++ libexif-0.6.21/debian/patches/cve-2017-7544.patch 2020-05-19 18:39:10.000000000 +1000 @@ -0,0 +1,22 @@ +Description: Fixes an out-of-bounds heap read in the exif_data_save_data_entry function (CVE-2017-7544) +Author: Marcus Meissner <mar...@jet.franken.de> +Bug-Debian: http://bugs.debian.org/876466 +Last-Update: 2017-07-04 + +Index: libexif-0.6.21/libexif/exif-data.c +=================================================================== +--- libexif-0.6.21.orig/libexif/exif-data.c ++++ libexif-0.6.21/libexif/exif-data.c +@@ -255,6 +255,12 @@ exif_data_save_data_entry (ExifData *dat + exif_mnote_data_set_offset (data->priv->md, *ds - 6); + exif_mnote_data_save (data->priv->md, &e->data, &e->size); + e->components = e->size; ++ if (exif_format_get_size (e->format) != 1) { ++ /* e->format is taken from input code, ++ * but we need to make sure it is a 1 byte ++ * entity due to the multiplication below. */ ++ e->format = EXIF_FORMAT_UNDEFINED; ++ } + } + } + diff -Nru libexif-0.6.21/debian/patches/cve-2018-20030.patch libexif-0.6.21/debian/patches/cve-2018-20030.patch --- libexif-0.6.21/debian/patches/cve-2018-20030.patch 1970-01-01 10:00:00.000000000 +1000 +++ libexif-0.6.21/debian/patches/cve-2018-20030.patch 2020-05-19 18:39:20.000000000 +1000 @@ -0,0 +1,111 @@ +From: Dan Fandrich <d...@coneharvesters.com> +Date: Fri, 12 Oct 2018 16:01:45 +0200 +Subject: Improve deep recursion detection in exif_data_load_data_content. +Origin: https://github.com/libexif/libexif/commit/6aa11df549114ebda520dde4cdaea2f9357b2c89 +Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2018-20030 +Bug-Debian: https://bugs.debian.org/918730 + +The existing detection was still vulnerable to pathological cases +causing DoS by wasting CPU. The new algorithm takes the number of tags +into account to make it harder to abuse by cases using shallow recursion +but with a very large number of tags. This improves on commit 5d28011c +which wasn't sufficient to counter this kind of case. + +The limitation in the previous fix was discovered by Laurent Delosieres, +Secunia Research at Flexera (Secunia Advisory SA84652) and is assigned +the identifier CVE-2018-20030. +--- + +--- a/libexif/exif-data.c ++++ b/libexif/exif-data.c +@@ -35,6 +35,7 @@ + #include <libexif/olympus/exif-mnote-data-olympus.h> + #include <libexif/pentax/exif-mnote-data-pentax.h> + ++#include <math.h> + #include <stdlib.h> + #include <stdio.h> + #include <string.h> +@@ -344,6 +345,20 @@ + break; \ + } + ++/*! Calculate the recursion cost added by one level of IFD loading. ++ * ++ * The work performed is related to the cost in the exponential relation ++ * work=1.1**cost ++ */ ++static unsigned int ++level_cost(unsigned int n) ++{ ++ static const double log_1_1 = 0.09531017980432493; ++ ++ /* Adding 0.1 protects against the case where n==1 */ ++ return ceil(log(n + 0.1)/log_1_1); ++} ++ + /*! Load data for an IFD. + * + * \param[in,out] data #ExifData +@@ -351,13 +366,13 @@ + * \param[in] d pointer to buffer containing raw IFD data + * \param[in] ds size of raw data in buffer at \c d + * \param[in] offset offset into buffer at \c d at which IFD starts +- * \param[in] recursion_depth number of times this function has been +- * recursively called without returning ++ * \param[in] recursion_cost factor indicating how expensive this recursive ++ * call could be + */ + static void + exif_data_load_data_content (ExifData *data, ExifIfd ifd, + const unsigned char *d, +- unsigned int ds, unsigned int offset, unsigned int recursion_depth) ++ unsigned int ds, unsigned int offset, unsigned int recursion_cost) + { + ExifLong o, thumbnail_offset = 0, thumbnail_length = 0; + ExifShort n; +@@ -372,9 +387,20 @@ + if ((((int)ifd) < 0) || ( ((int)ifd) >= EXIF_IFD_COUNT)) + return; + +- if (recursion_depth > 30) { ++ if (recursion_cost > 170) { ++ /* ++ * recursion_cost is a logarithmic-scale indicator of how expensive this ++ * recursive call might end up being. It is an indicator of the depth of ++ * recursion as well as the potential for worst-case future recursive ++ * calls. Since it's difficult to tell ahead of time how often recursion ++ * will occur, this assumes the worst by assuming every tag could end up ++ * causing recursion. ++ * The value of 170 was chosen to limit typical EXIF structures to a ++ * recursive depth of about 6, but pathological ones (those with very ++ * many tags) to only 2. ++ */ + exif_log (data->priv->log, EXIF_LOG_CODE_CORRUPT_DATA, "ExifData", +- "Deep recursion detected!"); ++ "Deep/expensive recursion detected!"); + return; + } + +@@ -416,15 +442,18 @@ + switch (tag) { + case EXIF_TAG_EXIF_IFD_POINTER: + CHECK_REC (EXIF_IFD_EXIF); +- exif_data_load_data_content (data, EXIF_IFD_EXIF, d, ds, o, recursion_depth + 1); ++ exif_data_load_data_content (data, EXIF_IFD_EXIF, d, ds, o, ++ recursion_cost + level_cost(n)); + break; + case EXIF_TAG_GPS_INFO_IFD_POINTER: + CHECK_REC (EXIF_IFD_GPS); +- exif_data_load_data_content (data, EXIF_IFD_GPS, d, ds, o, recursion_depth + 1); ++ exif_data_load_data_content (data, EXIF_IFD_GPS, d, ds, o, ++ recursion_cost + level_cost(n)); + break; + case EXIF_TAG_INTEROPERABILITY_IFD_POINTER: + CHECK_REC (EXIF_IFD_INTEROPERABILITY); +- exif_data_load_data_content (data, EXIF_IFD_INTEROPERABILITY, d, ds, o, recursion_depth + 1); ++ exif_data_load_data_content (data, EXIF_IFD_INTEROPERABILITY, d, ds, o, ++ recursion_cost + level_cost(n)); + break; + case EXIF_TAG_JPEG_INTERCHANGE_FORMAT: + thumbnail_offset = o; diff -Nru libexif-0.6.21/debian/patches/cve-2020-0093.patch libexif-0.6.21/debian/patches/cve-2020-0093.patch --- libexif-0.6.21/debian/patches/cve-2020-0093.patch 1970-01-01 10:00:00.000000000 +1000 +++ libexif-0.6.21/debian/patches/cve-2020-0093.patch 2020-05-19 18:39:22.000000000 +1000 @@ -0,0 +1,24 @@ +Description: Fix read buffer overflow (CVE-2020-0093) + Ensure the number of bytes being copied does not exceed the source buffer size. +Origin: commit: 5ae5973bed1947f4d447dc80b76d5cefadd90133 +Author: Marcus Meissner <mar...@jet.franken.de> +Bug: https://github.com/libexif/libexif/issues/42 +Last-Update: 2020-05-17 + +--- + libexif/exif-data.c | 4 +++- + 1 file changed, 3 insertions(+), 1 deletion(-) + +--- a/libexif/exif-data.c ++++ b/libexif/exif-data.c +@@ -295,7 +295,9 @@ + /* Write the data. Fill unneeded bytes with 0. Do not crash with + * e->data is NULL */ + if (e->data) { +- memcpy (*d + 6 + doff, e->data, s); ++ unsigned int len = s; ++ if (e->size < s) len = e->size; ++ memcpy (*d + 6 + doff, e->data, len); + } else { + memset (*d + 6 + doff, 0, s); + } diff -Nru libexif-0.6.21/debian/patches/cve-2020-12767.patch libexif-0.6.21/debian/patches/cve-2020-12767.patch --- libexif-0.6.21/debian/patches/cve-2020-12767.patch 1970-01-01 10:00:00.000000000 +1000 +++ libexif-0.6.21/debian/patches/cve-2020-12767.patch 2020-05-19 18:39:29.000000000 +1000 @@ -0,0 +1,34 @@ +Description: Prevent some possible division-by-zero errors in exif_entry_get_value() +Origin: commit:e22f73064f804c94e90b642cd0db4697c827da72 +Author: orangesnn <52818007+orange...@users.noreply.github.com> +Bug: https://github.com/libexif/libexif/issues/31 +Bug-Debian: https://bugs.debian.org/960199 +Last-Update: 2020-05-13 + +--- + libexif/exif-entry.c | 7 ++++--- + 1 file changed, 4 insertions(+), 3 deletions(-) + +--- a/libexif/exif-entry.c ++++ b/libexif/exif-entry.c +@@ -1085,7 +1085,7 @@ + break; + } + d = (double) v_rat.numerator / (double) v_rat.denominator; +- if (d < 1) ++ if (d < 1 && d) + snprintf (val, maxlen, _("1/%i"), (int) (0.5 + 1. / d)); + else + snprintf (val, maxlen, "%i", (int) d); +@@ -1102,8 +1102,9 @@ + } + d = (double) v_srat.numerator / (double) v_srat.denominator; + snprintf (val, maxlen, _("%.02f EV"), d); +- d = 1. / pow (2, d); +- if (d < 1) ++ if (pow (2, d)) ++ d = 1. / pow (2, d); ++ if (d < 1 && d) + snprintf (b, sizeof (b), _(" (1/%d sec.)"), (int) (1. / d)); + else + snprintf (b, sizeof (b), _(" (%d sec.)"), (int) d); diff -Nru libexif-0.6.21/debian/patches/series libexif-0.6.21/debian/patches/series --- libexif-0.6.21/debian/patches/series 2020-02-02 07:54:38.000000000 +1100 +++ libexif-0.6.21/debian/patches/series 2020-05-19 18:39:29.000000000 +1000 @@ -1,3 +1,8 @@ +cve-2020-12767.patch +cve-2020-0093.patch +cve-2018-20030.patch +cve-2017-7544.patch +cve-2016-6328.patch pkg_config_header_dir extra_colorspace_check fix-CVE-2019-9278.patch