MGASA-2018-0457

Source
https://advisories.mageia.org/MGASA-2018-0457.html
Import Source
https://advisories.mageia.org/MGASA-2018-0457.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0457
Related
Published
2018-11-17T22:23:26Z
Modified
2018-11-17T21:58:27Z
Summary
Updated jhead package fixes security vulnerabilities
Details

The ProcessGpsInfo function may have allowed a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because of inconsistency between float and double in a sprintf format string during TAGGPSALT handling (CVE-2018-16554).

The ProcessGpsInfo function may have allowed a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because there is an integer overflow during a check for whether a location exceeds the EXIF data length (CVE-2018-17088).

References
Credits

Affected packages