A vulnerability was found in libexif. An integer overflow when parsing the MNOTE entry data of the input file. This can cause Denial-of-Service (DoS) and Information Disclosure (disclosing some critical heap chunk metadata, even other applications' private data).
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-6328 | Issue Tracking Patch Third Party Advisory |
https://usn.ubuntu.com/4277-1/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/05/msg00016.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202007-05 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2018-10-31 15:29
Updated : 2023-02-12 15:25
NVD link : CVE-2016-6328
Mitre link : CVE-2016-6328
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
libexif_project
- libexif