lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20081015003247.GJ17241@outflux.net>
Date: Tue, 14 Oct 2008 17:32:47 -0700
From: Kees Cook <kees@...ntu.com>
To: ubuntu-security-announce@...ts.ubuntu.com
Cc: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: [USN-654-1] libexif vulnerabilities

===========================================================
Ubuntu Security Notice USN-654-1           October 14, 2008
libexif vulnerabilities
CVE-2007-6351, CVE-2007-6352
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 7.04
Ubuntu 7.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  libexif12                       0.6.12-2ubuntu0.3

Ubuntu 7.04:
  libexif12                       0.6.13-5ubuntu0.3

Ubuntu 7.10:
  libexif12                       0.6.16-1ubuntu0.1

After a standard system upgrade you need to restart your session to effect
the necessary changes.

Details follow:

Meder Kydyraliev discovered that libexif did not correctly handle certain
EXIF headers.  If a user or automated system were tricked into processing
a specially crafted image, a remote attacker could cause the application
linked against libexif to crash, leading to a denial of service, or
possibly executing arbitrary code with user privileges.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif_0.6.12-2ubuntu0.3.diff.gz
      Size/MD5:     4765 04c7e73ecece1f9f42516b6e9c997adb
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif_0.6.12-2ubuntu0.3.dsc
      Size/MD5:      646 70f71ef6e2246e9a2bb4f2f02e61cc41
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif_0.6.12.orig.tar.gz
      Size/MD5:   537829 69501aaf0862a79aaeeb73e81e8c1306

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif-dev_0.6.12-2ubuntu0.3_amd64.deb
      Size/MD5:    77784 4a873cf21ce3be25603cae7812a8b8d9
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif12_0.6.12-2ubuntu0.3_amd64.deb
      Size/MD5:    61968 2a96cfe5d19af5941a65b26a2f08b05d

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif-dev_0.6.12-2ubuntu0.3_i386.deb
      Size/MD5:    73040 ea5652234ef1f6ec6599537977474662
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif12_0.6.12-2ubuntu0.3_i386.deb
      Size/MD5:    57832 35743ac1e60d661fb6732b8dd6f47dc8

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif-dev_0.6.12-2ubuntu0.3_powerpc.deb
      Size/MD5:    78270 b6a62e5af9be3d39e0120e1febed6c5e
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif12_0.6.12-2ubuntu0.3_powerpc.deb
      Size/MD5:    60856 9521ddaf67e4c41917d675c9c9ae5836

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif-dev_0.6.12-2ubuntu0.3_sparc.deb
      Size/MD5:    75786 254df3e31bbaf47b992c9a91f8e33448
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif12_0.6.12-2ubuntu0.3_sparc.deb
      Size/MD5:    58816 81e247e09522421280a83e0ebcb2d9fb

Updated packages for Ubuntu 7.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif_0.6.13-5ubuntu0.3.diff.gz
      Size/MD5:    10064 df74457a3f072138b4adf327f0921c5e
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif_0.6.13-5ubuntu0.3.dsc
      Size/MD5:      750 e3cfd9782d221f1b7ac234afbf9cd173
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif_0.6.13.orig.tar.gz
      Size/MD5:   727418 e5ad93c170bfb4fed6dc3e1c7a7948cb

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif-dev_0.6.13-5ubuntu0.3_amd64.deb
      Size/MD5:  1005978 12f9016542fa2dab6244833228219334
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif12_0.6.13-5ubuntu0.3_amd64.deb
      Size/MD5:    70346 32f78b0313d4ca69cf2e19090b07efeb

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif-dev_0.6.13-5ubuntu0.3_i386.deb
      Size/MD5:   996666 b77bd6abf021efc041b2e4c0b5b40ea2
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif12_0.6.13-5ubuntu0.3_i386.deb
      Size/MD5:    67310 61ba31cc3c63ce7f79ece1277528c1bf

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif-dev_0.6.13-5ubuntu0.3_powerpc.deb
      Size/MD5:  1006356 bc29b4428ed98f17ffe1bd6d6ca6609a
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif12_0.6.13-5ubuntu0.3_powerpc.deb
      Size/MD5:    67786 a7a951b56a444c40b092a3c117e822a0

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif-dev_0.6.13-5ubuntu0.3_sparc.deb
      Size/MD5:  1003438 01d7a1b6a742f36d75548f74f630c8bc
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif12_0.6.13-5ubuntu0.3_sparc.deb
      Size/MD5:    65594 3a855f078fc9d092c567aebe7012802d

Updated packages for Ubuntu 7.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif_0.6.16-1ubuntu0.1.diff.gz
      Size/MD5:    17340 5a63929bc9580125b3520c6df9f7cac7
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif_0.6.16-1ubuntu0.1.dsc
      Size/MD5:      759 b31453402e0dbc58f2efff88922f8133
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif_0.6.16.orig.tar.gz
      Size/MD5:  1006359 13ceaf57b428f27cac86195a7df1f7f6

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif-dev_0.6.16-1ubuntu0.1_amd64.deb
      Size/MD5:   170838 c19d8415b29e07b757efdca5d5435bd6
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif12_0.6.16-1ubuntu0.1_amd64.deb
      Size/MD5:    80764 faf340037e6b98de5b9c41d145cc6c02

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif-dev_0.6.16-1ubuntu0.1_i386.deb
      Size/MD5:   164078 9efe80d75a6d8d7970d607e5a975f5ed
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif12_0.6.16-1ubuntu0.1_i386.deb
      Size/MD5:    75536 978e7f3d01dbcde5f8ee2fbf07ac9afc

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/libe/libexif/libexif-dev_0.6.16-1ubuntu0.1_lpia.deb
      Size/MD5:   163364 787a375da7e72dc10d7f8464b442af48
    http://ports.ubuntu.com/pool/main/libe/libexif/libexif12_0.6.16-1ubuntu0.1_lpia.deb
      Size/MD5:    74526 e608b8191bf4dafc7e6962d79d9556e4

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif-dev_0.6.16-1ubuntu0.1_powerpc.deb
      Size/MD5:   169872 5e7585184d409918670150486d8a1a57
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif12_0.6.16-1ubuntu0.1_powerpc.deb
      Size/MD5:    77072 7c960380692cfbbc709d0df73b8e0691

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif-dev_0.6.16-1ubuntu0.1_sparc.deb
      Size/MD5:   166628 24dbcba556a13d44b5b2e7178ff629b0
    http://security.ubuntu.com/ubuntu/pool/main/libe/libexif/libexif12_0.6.16-1ubuntu0.1_sparc.deb
      Size/MD5:    75038 0395cc735da2f03c02d147e0124f4828


Download attachment "signature.asc" of type "application/pgp-signature" (236 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ