Skip to content

Conversation

@tabudz
Copy link

@tabudz tabudz commented Dec 17, 2025

Summary

Our tool detected a potential vulnerability in src/plugins/pictview/exif/libexif/exif-data.c which was cloned from libexif/libexif but did not receive the security patch applied. The original issue was reported and fixed under https://nvd.nist.gov/vuln/detail/cve-2019-9278.

Proposed Fix

Apply the same patch as the one in libexif/libexif to eliminate the vulnerability.

Reference

https://nvd.nist.gov/vuln/detail/cve-2019-9278
libexif/libexif@75aa732

avoid the use of unsafe integer overflow checking constructs (unsigned integer operations cannot overflow, so "u1 + u2 > u1" can be optimized away)

check for the actual sizes, which should also handle the overflows
document other places google patched, but do not seem relevant due to other restrictions
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants