<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libexif-devel-0.6.23-1.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10939</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libexif-devel-0.6.23-1.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libexif-devel-0.6.23-1.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10939</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10939</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-6351/</URL>
      <Description>SUSE CVE CVE-2007-6351 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6328/</URL>
      <Description>SUSE CVE CVE-2016-6328 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7544/</URL>
      <Description>SUSE CVE CVE-2017-7544 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20030/</URL>
      <Description>SUSE CVE CVE-2018-20030 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9278/</URL>
      <Description>SUSE CVE CVE-2019-9278 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0093/</URL>
      <Description>SUSE CVE CVE-2020-0093 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0198/</URL>
      <Description>SUSE CVE CVE-2020-0198 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0452/</URL>
      <Description>SUSE CVE CVE-2020-0452 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12767/</URL>
      <Description>SUSE CVE CVE-2020-12767 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13112/</URL>
      <Description>SUSE CVE CVE-2020-13112 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13113/</URL>
      <Description>SUSE CVE CVE-2020-13113 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13114/</URL>
      <Description>SUSE CVE CVE-2020-13114 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libexif-devel-0.6.23-1.2">
      <FullProductName ProductID="libexif-devel-0.6.23-1.2">libexif-devel-0.6.23-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libexif-devel-32bit-0.6.23-1.2">
      <FullProductName ProductID="libexif-devel-32bit-0.6.23-1.2">libexif-devel-32bit-0.6.23-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libexif12-0.6.23-1.2">
      <FullProductName ProductID="libexif12-0.6.23-1.2">libexif12-0.6.23-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libexif12-32bit-0.6.23-1.2">
      <FullProductName ProductID="libexif12-32bit-0.6.23-1.2">libexif12-32bit-0.6.23-1.2</FullProductName>
    </Branch>
    <Relationship ProductReference="libexif-devel-0.6.23-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libexif-devel-0.6.23-1.2">libexif-devel-0.6.23-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libexif-devel-32bit-0.6.23-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libexif-devel-32bit-0.6.23-1.2">libexif-devel-32bit-0.6.23-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libexif12-0.6.23-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libexif12-0.6.23-1.2">libexif12-0.6.23-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libexif12-32bit-0.6.23-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libexif12-32bit-0.6.23-1.2">libexif12-32bit-0.6.23-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libexif 0.6.16 and earlier allows context-dependent attackers to cause a denial of service (infinite recursion) via an image file with crafted EXIF tags, possibly involving the exif_loader_write function in exif_loader.c.</Note>
    </Notes>
    <CVE>CVE-2007-6351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libexif-devel-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif-devel-32bit-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-32bit-0.6.23-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-6351.html</URL>
        <Description>CVE-2007-6351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/348748</URL>
        <Description>SUSE Bug 348748</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in libexif. An integer overflow when parsing the MNOTE entry data of the input file. This can cause Denial-of-Service (DoS) and Information Disclosure (disclosing some critical heap chunk metadata, even other applications' private data).</Note>
    </Notes>
    <CVE>CVE-2016-6328</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libexif-devel-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif-devel-32bit-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-32bit-0.6.23-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6328.html</URL>
        <Description>CVE-2016-6328</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1055857</URL>
        <Description>SUSE Bug 1055857</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libexif through 0.6.21 is vulnerable to out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c caused by improper length computation of the allocated data of an ExifMnote entry which can cause denial-of-service or possibly information disclosure.</Note>
    </Notes>
    <CVE>CVE-2017-7544</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libexif-devel-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif-devel-32bit-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-32bit-0.6.23-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7544.html</URL>
        <Description>CVE-2017-7544</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1059893</URL>
        <Description>SUSE Bug 1059893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An error when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EXIF tags within libexif version 0.6.21 can be exploited to exhaust available CPU resources.</Note>
    </Notes>
    <CVE>CVE-2018-20030</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libexif-devel-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif-devel-32bit-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-32bit-0.6.23-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20030.html</URL>
        <Description>CVE-2018-20030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120943</URL>
        <Description>SUSE Bug 1120943</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libexif, there is a possible out of bounds write due to an integer overflow. This could lead to remote escalation of privilege in the media content provider with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112537774</Note>
    </Notes>
    <CVE>CVE-2019-9278</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libexif-devel-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif-devel-32bit-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-32bit-0.6.23-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9278.html</URL>
        <Description>CVE-2019-9278</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160770</URL>
        <Description>SUSE Bug 1160770</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In exif_data_save_data_entry of exif-data.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-148705132</Note>
    </Notes>
    <CVE>CVE-2020-0093</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libexif-devel-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif-devel-32bit-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-32bit-0.6.23-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0093.html</URL>
        <Description>CVE-2020-0093</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171847</URL>
        <Description>SUSE Bug 1171847</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172116</URL>
        <Description>SUSE Bug 1172116</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146428941</Note>
    </Notes>
    <CVE>CVE-2020-0198</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libexif-devel-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif-devel-32bit-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-32bit-0.6.23-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0198.html</URL>
        <Description>CVE-2020-0198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172768</URL>
        <Description>SUSE Bug 1172768</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In exif_entry_get_value of exif-entry.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if a third party app used this library to process remote image data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-159625731</Note>
    </Notes>
    <CVE>CVE-2020-0452</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libexif-devel-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif-devel-32bit-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-32bit-0.6.23-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0452.html</URL>
        <Description>CVE-2020-0452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178479</URL>
        <Description>SUSE Bug 1178479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208307</URL>
        <Description>SUSE Bug 1208307</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">exif_entry_get_value in exif-entry.c in libexif 0.6.21 has a divide-by-zero error.</Note>
    </Notes>
    <CVE>CVE-2020-12767</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libexif-devel-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif-devel-32bit-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-32bit-0.6.23-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12767.html</URL>
        <Description>CVE-2020-12767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171475</URL>
        <Description>SUSE Bug 1171475</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in libexif before 0.6.22. Several buffer over-reads in EXIF MakerNote handling could lead to information disclosure and crashes. This is different from CVE-2020-0093.</Note>
    </Notes>
    <CVE>CVE-2020-13112</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libexif-devel-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif-devel-32bit-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-32bit-0.6.23-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13112.html</URL>
        <Description>CVE-2020-13112</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172116</URL>
        <Description>SUSE Bug 1172116</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in libexif before 0.6.22. Use of uninitialized memory in EXIF Makernote handling could lead to crashes and potential use-after-free conditions.</Note>
    </Notes>
    <CVE>CVE-2020-13113</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libexif-devel-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif-devel-32bit-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-32bit-0.6.23-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13113.html</URL>
        <Description>CVE-2020-13113</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172105</URL>
        <Description>SUSE Bug 1172105</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in libexif before 0.6.22. An unrestricted size in handling Canon EXIF MakerNote data could lead to consumption of large amounts of compute time for decoding EXIF data.</Note>
    </Notes>
    <CVE>CVE-2020-13114</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libexif-devel-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif-devel-32bit-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-0.6.23-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libexif12-32bit-0.6.23-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13114.html</URL>
        <Description>CVE-2020-13114</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172121</URL>
        <Description>SUSE Bug 1172121</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
