First published: Thu Jun 11 2020(Updated: )
In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146428941
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libexif | 0.6.22-3 0.6.24-1 | |
Google Android | =10.0 | |
libexif | <0.6.22_p20201105 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.10 | |
Ubuntu Linux | =20.04 | |
Debian Debian Linux | =8.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-0198.
The severity of CVE-2020-0198 is high with a severity value of 7.5 out of 10.
CVE-2020-0198 occurs due to an integer overflow in the exif_data_load_data_content function of exif-data.c.
The impact of CVE-2020-0198 is a possible UBSAN abort, leading to remote denial of service with no additional execution privileges needed.
To fix CVE-2020-0198, update the libexif package to version 0.6.21-5.1+deb10u5, 0.6.22-3, or 0.6.24-1.