USN-4396-1

Source
https://ubuntu.com/security/notices/USN-4396-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4396-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4396-1
Upstream
Related
Published
2020-06-16T13:12:31.596089Z
Modified
2025-10-13T04:35:09Z
Summary
libexif vulnerabilities
Details

It was discovered that libexif incorrectly handled certain inputs. An attacker could possibly use this issue to expose sensitive information. (CVE-2020-0093, CVE-2020-0182)

It was discovered that libexif incorrectly handled certain inputs. An attacker could possibly use this issue to cause a remote denial of service. (CVE-2020-0198)

It was discovered that libexif incorrectly handled certain inputs. An attacker could possibly use this issue to expose sensitive information or cause a crash. (CVE-2020-13112)

It was discovered that libexif incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash. (CVE-2020-13113)

It was discovered libexif incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2020-13114)

References

Affected packages

Ubuntu:Pro:14.04:LTS / libexif

Package

Name
libexif
Purl
pkg:deb/ubuntu/libexif@0.6.21-1ubuntu1+esm5?arch=source&distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.21-1ubuntu1+esm5

Affected versions

0.*

0.6.21-1
0.6.21-1ubuntu1
0.6.21-1ubuntu1+esm1
0.6.21-1ubuntu1+esm2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "libexif-dev",
            "binary_version": "0.6.21-1ubuntu1+esm5"
        },
        {
            "binary_name": "libexif12",
            "binary_version": "0.6.21-1ubuntu1+esm5"
        }
    ]
}

Database specific

{
    "cves_map": {
        "ecosystem": "Ubuntu:Pro:14.04:LTS",
        "cves": [
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "low"
                    }
                ],
                "id": "CVE-2020-0093"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-0182"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-0198"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-13112"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-13113"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "low"
                    }
                ],
                "id": "CVE-2020-13114"
            }
        ]
    }
}

Ubuntu:16.04:LTS / libexif

Package

Name
libexif
Purl
pkg:deb/ubuntu/libexif@0.6.21-2ubuntu0.5?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.21-2ubuntu0.5

Affected versions

0.*

0.6.21-2
0.6.21-2ubuntu0.1
0.6.21-2ubuntu0.2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "libexif-dev",
            "binary_version": "0.6.21-2ubuntu0.5"
        },
        {
            "binary_name": "libexif12",
            "binary_version": "0.6.21-2ubuntu0.5"
        }
    ]
}

Database specific

{
    "cves_map": {
        "ecosystem": "Ubuntu:16.04:LTS",
        "cves": [
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "low"
                    }
                ],
                "id": "CVE-2020-0093"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-0182"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-0198"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-13112"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-13113"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "low"
                    }
                ],
                "id": "CVE-2020-13114"
            }
        ]
    }
}

Ubuntu:18.04:LTS / libexif

Package

Name
libexif
Purl
pkg:deb/ubuntu/libexif@0.6.21-4ubuntu0.5?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.21-4ubuntu0.5

Affected versions

0.*

0.6.21-2.1
0.6.21-4
0.6.21-4ubuntu0.1
0.6.21-4ubuntu0.2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "libexif-dev",
            "binary_version": "0.6.21-4ubuntu0.5"
        },
        {
            "binary_name": "libexif12",
            "binary_version": "0.6.21-4ubuntu0.5"
        }
    ]
}

Database specific

{
    "cves_map": {
        "ecosystem": "Ubuntu:18.04:LTS",
        "cves": [
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "low"
                    }
                ],
                "id": "CVE-2020-0093"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-0182"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-0198"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-13112"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-13113"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "low"
                    }
                ],
                "id": "CVE-2020-13114"
            }
        ]
    }
}

Ubuntu:20.04:LTS / libexif

Package

Name
libexif
Purl
pkg:deb/ubuntu/libexif@0.6.21-6ubuntu0.3?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.21-6ubuntu0.3

Affected versions

0.*

0.6.21-5.1
0.6.21-6
0.6.21-6ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "libexif-dev",
            "binary_version": "0.6.21-6ubuntu0.3"
        },
        {
            "binary_name": "libexif12",
            "binary_version": "0.6.21-6ubuntu0.3"
        }
    ]
}

Database specific

{
    "cves_map": {
        "ecosystem": "Ubuntu:20.04:LTS",
        "cves": [
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "low"
                    }
                ],
                "id": "CVE-2020-0093"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-0182"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-0198"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-13112"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2020-13113"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "low"
                    }
                ],
                "id": "CVE-2020-13114"
            }
        ]
    }
}