DescriptionHeap-based buffer overflow in the exif_entry_fix function (aka the tag fixup routine) in libexif/exif-entry.c in libexif 0.6.18 allows remote attackers to cause a denial of service or possibly execute arbitrary code via an invalid EXIF image. NOTE: some of these details are obtained from third party information.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs557137

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libexif (PTS)buster, buster (security)0.6.21-5.1+deb10u5fixed
trixie, bookworm, sid0.6.24-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libexifsourceetch(not affected)
libexifsourcelenny(not affected)


[lenny] - libexif <not-affected> (Only 0.6.18 is affected)
[etch] - libexif <not-affected> (Only 0.6.18 is affected)

Search for package or bug name: Reporting problems