Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
CVE-2021-34055
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2021-34055
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-34055.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-34055
Downstream
DEBIAN-CVE-2021-34055
DLA-3219-1
DSA-5294-1
UBUNTU-CVE-2021-34055
USN-6108-1
openSUSE-SU-2022:10202-1
openSUSE-SU-2022:10203-1
openSUSE-SU-2024:12499-1
Related
openSUSE-SU-2022:10202-1
openSUSE-SU-2022:10203-1
openSUSE-SU-2024:12499-1
Published
2022-11-04T17:15:10Z
Modified
2025-10-15T13:03:52.789232Z
Severity
7.8 (High)
CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS Calculator
Summary
[none]
Details
jhead 3.06 is vulnerable to Buffer Overflow via exif.c in function Put16u.
References
https://github.com/Matthias-Wandel/jhead/issues/36
https://lists.debian.org/debian-lts-announce/2022/12/msg00004.html
https://www.debian.org/security/2022/dsa-5294
Affected packages
Git
/
github.com/matthias-wandel/jhead
Affected ranges
Type
GIT
Repo
https://github.com/matthias-wandel/jhead
Events
Introduced
0
Unknown introduced commit / All previous commits are affected
Last affected
78057ab115e7fe68ba18869f97240cba58b9e996
Affected versions
3.*
3.06.0.1
CVE-2021-34055 - OSV