Your message dated Mon, 18 Feb 2019 14:56:20 +0000
with message-id <e1gvkle-000gay...@fasolo.debian.org>
and subject line Bug#918730: fixed in libexif 0.6.21-5.1
has caused the Debian Bug report #918730,
regarding libexif: CVE-2018-20030: Input validation issue resulting in a denial 
of service
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
918730: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918730
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libexif
Version: 0.6.21-5
Severity: important
Tags: security upstream
Control: found -1 0.6.21-2

Hi,

The following vulnerability was published for libexif, for now filling
primarly for tracking, as there is not much details provided as well
if searching the cross references to other distros bugtrackers.

CVE-2018-20030[0]:
Input validation issue resulting in a denial of service

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-20030
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20030
[1] https://secuniaresearch.flexerasoftware.com/secunia_research/2018-28/

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: libexif
Source-Version: 0.6.21-5.1

We believe that the bug you reported is fixed in the latest version of
libexif, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 918...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <car...@debian.org> (supplier of updated libexif package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 10 Feb 2019 14:59:33 +0100
Source: libexif
Binary: libexif-dev libexif-doc libexif12 libexif12-dbgsym
Architecture: source
Version: 0.6.21-5.1
Distribution: unstable
Urgency: medium
Maintainer: Debian PhotoTools Maintainers 
<pkg-phototools-de...@lists.alioth.debian.org>
Changed-By: Salvatore Bonaccorso <car...@debian.org>
Closes: 918730
Description: 
 libexif-dev - library to parse EXIF files (development files)
 libexif-doc - library to parse EXIF files (documentation)
 libexif12  - library to parse EXIF files
Changes:
 libexif (0.6.21-5.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Reduce maximum recursion depth in exif_data_load_data_content
   * Improve deep recursion detection in exif_data_load_data_content
     (CVE-2018-20030) (Closes: #918730)
Checksums-Sha1: 
 4f657f30b6be242741bc65b1db78cc3ef6c0e4af 2272 libexif_0.6.21-5.1.dsc
 c3cdeedecf57c2db9d12cd0f0f8980073ed495a7 13020 libexif_0.6.21-5.1.debian.tar.xz
Checksums-Sha256: 
 98676c725f48a1602b50499329df85545c997825705980ce5d27ec77effd7310 2272 
libexif_0.6.21-5.1.dsc
 e026131413e0a951323e8325c9ce175fdb51d7820140c3e79db2a0b25d453c48 13020 
libexif_0.6.21-5.1.debian.tar.xz
Files: 
 39bdd77652a0e93a80e57b5401bf870a 2272 libs optional libexif_0.6.21-5.1.dsc
 dde6f69b343d1f04585a6b6ec485b4a1 13020 libs optional 
libexif_0.6.21-5.1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlxgRddfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
ZWJpYW4ub3JnAAoJEAVMuPMTQ89EsL0QAJuoBgJEaeqM2WbH5133gI/bKWqQH9Xv
YO/K9XP8grZEqJHBHqBuCAUPSNCK+5mVD/1TFW9CtJziGUwDXI3k4p/SIMmS3zVa
iKKAjrB1+mm6rjCzw4AV7Dogw068BI8eHkgZJxIz6FiEotq4sQiklrcmuE7PU5jc
DVc4CnWG0++0YdwbJPLxhylUQ3yHP4cttWUIWBq03Hmnw/K1Q64QhJgSmkN6Y/Q6
uZeBNwCioTOQ7lt+7Sg7duNoOvg47IwAxpwR32KDxoB1oCPO4mlov6wy/Oao4Frz
nDr27u8jBZlBZ38521ffVpysvKFEMJOq3BDUDulKvPYD/b4XoxBcHASptXNGBO6k
QwBeA2ln7kr5jQt3ZzDJYxUOpHbNfMxs5PnAUB9hZ/tQGEmhtxNzGCNsKz1EGQaT
Zte+CtPdblWvSJdrWacIluv3X8nx/qj6+Tys0ZKQ30UUUST5ni57VAqrk5OV8Bi8
+pSOFqAYXFyQb97NK/dx5qxcp4SZkSwPKPmnQeIa+7a5Koykbsr+yp7JoIbBCulM
x+q5JCHLWjFfNtBaO/X0Tjp4b0Z8TthOOAJRLlhocCW9Y+tsvgYOmw78jaolwS1t
LMmMpztOQc2zaRQgPGg/QbUdjosH2cAfB+jeECyKQcOSb6n/vYAUFp7HkLFxaC92
JncS8cKAwKQ2
=LU/k
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to