MGASA-2021-0328

Source
https://advisories.mageia.org/MGASA-2021-0328.html
Import Source
https://advisories.mageia.org/MGASA-2021-0328.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0328
Related
Published
2021-07-10T12:56:54Z
Modified
2021-07-10T11:35:47Z
Summary
Updated jhead packages fix security vulnerabilities
Details

Updated jhead package fixes security vulnerabilities:

jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess.c (CVE-2020-6624).

jhead through 3.04 has a heap-based buffer over-read in Get32s when called from ProcessGpsInfo in gpsinfo.c (CVE-2020-6625).

A heap-based buffer overflow was found in jhead in version 3.06 in Get16u() in exif.c when processing a crafted file (CVE-2021-3496).

References
Credits

Affected packages

Mageia:7 / jhead

Package

Name
jhead
Purl
pkg:rpm/mageia/jhead?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.06.0.1-1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / jhead

Package

Name
jhead
Purl
pkg:rpm/mageia/jhead?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.06.0.1-1.mga8

Ecosystem specific

{
    "section": "core"
}