Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-6612 (GCVE-0-2018-6612)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272 | Third Party Advisory | |
cve@mitre.org | https://launchpad.net/ubuntu/+source/jhead/1:3.00-6 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.net/ubuntu/+source/jhead/1:3.00-6 | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:10:10.403Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://launchpad.net/ubuntu/+source/jhead/1:3.00-6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-04T15:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://launchpad.net/ubuntu/+source/jhead/1:3.00-6" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-6612", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272", "refsource": "CONFIRM", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272" }, { "name": "https://launchpad.net/ubuntu/+source/jhead/1:3.00-6", "refsource": "CONFIRM", "url": "https://launchpad.net/ubuntu/+source/jhead/1:3.00-6" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-6612", "datePublished": "2018-02-04T15:00:00Z", "dateReserved": "2018-02-04T00:00:00Z", "dateUpdated": "2024-09-17T03:17:57.692Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-6612\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-02-04T15:29:00.237\",\"lastModified\":\"2024-11-21T04:10:59.727\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact.\"},{\"lang\":\"es\",\"value\":\"Un error de subdesbordamiento de enteros en la funci\u00f3n process_EXIF del archivo exif.c en jhead 3.00 eleva una sobrelectura de b\u00fafer basada en memoria din\u00e1mica (heap) al procesar un archivo JPEG malicioso. Esto podr\u00eda permitir que un atacante remoto provoque un ataque de denegaci\u00f3n de servicio (DoS) u otro tipo de impacto sin especificar.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"},{\"lang\":\"en\",\"value\":\"CWE-191\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jhead_project:jhead:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44A93050-5580-44C1-B5DE-D45C1771E888\"}]}]}],\"references\":[{\"url\":\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://launchpad.net/ubuntu/+source/jhead/1:3.00-6\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://launchpad.net/ubuntu/+source/jhead/1:3.00-6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
cnvd-2018-04849
Vulnerability from cnvd
Title: jhead 'process_EXIF'函数整数溢出漏洞漏洞
Description:
jhead是一款用于修改JPEG文件信息的工具。
jhead 3.00版本中的exif.c文件的'process_EXIF'函数存在整数溢出漏洞。远程攻击者可借助恶意的JPEG文件利用该漏洞造成拒绝服务。
Severity: 中
Patch Name: jhead 'process_EXIF'函数整数溢出漏洞漏洞的补丁
Patch Description:
jhead是一款用于修改JPEG文件信息的工具。
jhead 3.00版本中的exif.c文件的'process_EXIF'函数存在整数溢出漏洞。远程攻击者可借助恶意的JPEG文件利用该漏洞造成拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布漏洞修复程序,请及时关注更新: https://launchpad.net/ubuntu/+source/jhead/1:3.00-6
Reference: https://nvd.nist.gov/vuln/detail/CVE-2018-6612
Name | Jhead jhead 3.00 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2018-6612" } }, "description": "jhead\u662f\u4e00\u6b3e\u7528\u4e8e\u4fee\u6539JPEG\u6587\u4ef6\u4fe1\u606f\u7684\u5de5\u5177\u3002\r\n\r\njhead 3.00\u7248\u672c\u4e2d\u7684exif.c\u6587\u4ef6\u7684\u0027process_EXIF\u0027\u51fd\u6570\u5b58\u5728\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u6076\u610f\u7684JPEG\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002", "discovererName": "Joonun Jang \u003cjoonun.jang@gmail.com\u003e", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://launchpad.net/ubuntu/+source/jhead/1:3.00-6", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2018-04849", "openTime": "2018-03-12", "patchDescription": "jhead\u662f\u4e00\u6b3e\u7528\u4e8e\u4fee\u6539JPEG\u6587\u4ef6\u4fe1\u606f\u7684\u5de5\u5177\u3002\r\n\r\njhead 3.00\u7248\u672c\u4e2d\u7684exif.c\u6587\u4ef6\u7684\u0027process_EXIF\u0027\u51fd\u6570\u5b58\u5728\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u6076\u610f\u7684JPEG\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "jhead \u0027process_EXIF\u0027\u51fd\u6570\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Jhead jhead 3.00" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-6612", "serverity": "\u4e2d", "submitTime": "2018-02-05", "title": "jhead \u0027process_EXIF\u0027\u51fd\u6570\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e\u6f0f\u6d1e" }
ghsa-73qf-rvc2-8ggj
Vulnerability from github
An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact.
{ "affected": [], "aliases": [ "CVE-2018-6612" ], "database_specific": { "cwe_ids": [ "CWE-125" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-02-04T15:29:00Z", "severity": "MODERATE" }, "details": "An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact.", "id": "GHSA-73qf-rvc2-8ggj", "modified": "2022-05-13T01:20:29Z", "published": "2022-05-13T01:20:29Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-6612" }, { "type": "WEB", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272" }, { "type": "WEB", "url": "https://launchpad.net/ubuntu/+source/jhead/1:3.00-6" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
opensuse-su-2021:0743-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for jhead", "title": "Title of the patch" }, { "category": "description", "text": "This update for jhead fixes the following issues:\n\njhead was updated to 3.06.0.1\n\n* lot of fuzztest fixes\n* Apply a whole bunch of patches from Debian.\n* Spell check and fuzz test stuff from Debian, nothing useful to\n human users.\n* Add option to set exif date from date from another file.\n* Bug fixes relating to fuzz testing.\n* Fix bug where thumbnail replacement DID NOT WORK.\n* Fix bug when no orientation tag is present\n* Fix bug of not clearing exif information when processing images\n with an without exif data in one invocation.\n* Remove some unnecessary warnings with some types of GPS data\n* Remove multiple copies of the same type of section when deleting\n section types\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-743", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0743-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:0743-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPTEPBJVJFSKKHSTZER2JVIMRP7MGN2C/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:0743-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPTEPBJVJFSKKHSTZER2JVIMRP7MGN2C/" }, { "category": "self", "summary": "SUSE Bug 1144316", "url": "https://bugzilla.suse.com/1144316" }, { "category": "self", "summary": "SUSE Bug 1144354", "url": "https://bugzilla.suse.com/1144354" }, { "category": "self", "summary": "SUSE Bug 1160544", "url": "https://bugzilla.suse.com/1160544" }, { "category": "self", "summary": "SUSE Bug 1160547", "url": "https://bugzilla.suse.com/1160547" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3822 page", "url": "https://www.suse.com/security/cve/CVE-2016-3822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16554 page", "url": "https://www.suse.com/security/cve/CVE-2018-16554/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17088 page", "url": "https://www.suse.com/security/cve/CVE-2018-17088/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6612 page", "url": "https://www.suse.com/security/cve/CVE-2018-6612/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1010301 page", "url": "https://www.suse.com/security/cve/CVE-2019-1010301/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1010302 page", "url": "https://www.suse.com/security/cve/CVE-2019-1010302/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6624 page", "url": "https://www.suse.com/security/cve/CVE-2020-6624/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6625 page", "url": "https://www.suse.com/security/cve/CVE-2020-6625/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3496 page", "url": "https://www.suse.com/security/cve/CVE-2021-3496/" } ], "title": "Security update for jhead", "tracking": { "current_release_date": "2021-05-16T14:04:45Z", "generator": { "date": "2021-05-16T14:04:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:0743-1", "initial_release_date": "2021-05-16T14:04:45Z", "revision_history": [ { "date": "2021-05-16T14:04:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-lp152.7.6.1.x86_64", "product": { "name": "jhead-3.06.0.1-lp152.7.6.1.x86_64", "product_id": "jhead-3.06.0.1-lp152.7.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-lp152.7.6.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" }, "product_reference": "jhead-3.06.0.1-lp152.7.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3822" } ], "notes": [ { "category": "general", "text": "exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3822", "url": "https://www.suse.com/security/cve/CVE-2016-3822" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2016-3822", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2016-3822", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "low" } ], "title": "CVE-2016-3822" }, { "cve": "CVE-2018-16554", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16554" } ], "notes": [ { "category": "general", "text": "The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because of inconsistency between float and double in a sprintf format string during TAG_GPS_ALT handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16554", "url": "https://www.suse.com/security/cve/CVE-2018-16554" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2018-16554", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2018-16554", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "low" } ], "title": "CVE-2018-16554" }, { "cve": "CVE-2018-17088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17088" } ], "notes": [ { "category": "general", "text": "The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because there is an integer overflow during a check for whether a location exceeds the EXIF data length. This is analogous to the CVE-2016-3822 integer overflow in exif.c. This gpsinfo.c vulnerability is unrelated to the CVE-2018-16554 gpsinfo.c vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17088", "url": "https://www.suse.com/security/cve/CVE-2018-17088" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2018-17088", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2018-17088", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "low" } ], "title": "CVE-2018-17088" }, { "cve": "CVE-2018-6612", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6612" } ], "notes": [ { "category": "general", "text": "An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6612", "url": "https://www.suse.com/security/cve/CVE-2018-6612" }, { "category": "external", "summary": "SUSE Bug 1079349 for CVE-2018-6612", "url": "https://bugzilla.suse.com/1079349" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "moderate" } ], "title": "CVE-2018-6612" }, { "cve": "CVE-2019-1010301", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1010301" } ], "notes": [ { "category": "general", "text": "jhead 3.03 is affected by: Buffer Overflow. The impact is: Denial of service. The component is: gpsinfo.c Line 151 ProcessGpsInfo(). The attack vector is: Open a specially crafted JPEG file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1010301", "url": "https://www.suse.com/security/cve/CVE-2019-1010301" }, { "category": "external", "summary": "SUSE Bug 1144316 for CVE-2019-1010301", "url": "https://bugzilla.suse.com/1144316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "low" } ], "title": "CVE-2019-1010301" }, { "cve": "CVE-2019-1010302", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1010302" } ], "notes": [ { "category": "general", "text": "jhead 3.03 is affected by: Incorrect Access Control. The impact is: Denial of service. The component is: iptc.c Line 122 show_IPTC(). The attack vector is: the victim must open a specially crafted JPEG file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1010302", "url": "https://www.suse.com/security/cve/CVE-2019-1010302" }, { "category": "external", "summary": "SUSE Bug 1144354 for CVE-2019-1010302", "url": "https://bugzilla.suse.com/1144354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "low" } ], "title": "CVE-2019-1010302" }, { "cve": "CVE-2020-6624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-6624" } ], "notes": [ { "category": "general", "text": "jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-6624", "url": "https://www.suse.com/security/cve/CVE-2020-6624" }, { "category": "external", "summary": "SUSE Bug 1160547 for CVE-2020-6624", "url": "https://bugzilla.suse.com/1160547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "important" } ], "title": "CVE-2020-6624" }, { "cve": "CVE-2020-6625", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-6625" } ], "notes": [ { "category": "general", "text": "jhead through 3.04 has a heap-based buffer over-read in Get32s when called from ProcessGpsInfo in gpsinfo.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-6625", "url": "https://www.suse.com/security/cve/CVE-2020-6625" }, { "category": "external", "summary": "SUSE Bug 1160544 for CVE-2020-6625", "url": "https://bugzilla.suse.com/1160544" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "important" } ], "title": "CVE-2020-6625" }, { "cve": "CVE-2021-3496", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3496" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow was found in jhead in version 3.06 in Get16u() in exif.c when processing a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3496", "url": "https://www.suse.com/security/cve/CVE-2021-3496" }, { "category": "external", "summary": "SUSE Bug 1184756 for CVE-2021-3496", "url": "https://bugzilla.suse.com/1184756" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "important" } ], "title": "CVE-2021-3496" } ] }
opensuse-su-2021:0752-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for jhead", "title": "Title of the patch" }, { "category": "description", "text": "This update for jhead fixes the following issues:\n\njhead was updated to 3.06.0.1\n\n* lot of fuzztest fixes\n* Apply a whole bunch of patches from Debian.\n* Spell check and fuzz test stuff from Debian, nothing useful to\n human users.\n* Add option to set exif date from date from another file.\n* Bug fixes relating to fuzz testing.\n* Fix bug where thumbnail replacement DID NOT WORK.\n* Fix bug when no orientation tag is present\n* Fix bug of not clearing exif information when processing images\n with an without exif data in one invocation.\n* Remove some unnecessary warnings with some types of GPS data\n* Remove multiple copies of the same type of section when deleting\n section types\n\nThis update was imported from the openSUSE:Leap:15.2:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-752", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0752-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:0752-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBTHCPCHWJ3JG5IDEDAYSW5LVUEVXYH/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:0752-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBTHCPCHWJ3JG5IDEDAYSW5LVUEVXYH/" }, { "category": "self", "summary": "SUSE Bug 1144316", "url": "https://bugzilla.suse.com/1144316" }, { "category": "self", "summary": "SUSE Bug 1144354", "url": "https://bugzilla.suse.com/1144354" }, { "category": "self", "summary": "SUSE Bug 1160544", "url": "https://bugzilla.suse.com/1160544" }, { "category": "self", "summary": "SUSE Bug 1160547", "url": "https://bugzilla.suse.com/1160547" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3822 page", "url": "https://www.suse.com/security/cve/CVE-2016-3822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16554 page", "url": "https://www.suse.com/security/cve/CVE-2018-16554/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17088 page", "url": "https://www.suse.com/security/cve/CVE-2018-17088/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6612 page", "url": "https://www.suse.com/security/cve/CVE-2018-6612/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1010301 page", "url": "https://www.suse.com/security/cve/CVE-2019-1010301/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1010302 page", "url": "https://www.suse.com/security/cve/CVE-2019-1010302/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6624 page", "url": "https://www.suse.com/security/cve/CVE-2020-6624/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6625 page", "url": "https://www.suse.com/security/cve/CVE-2020-6625/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3496 page", "url": "https://www.suse.com/security/cve/CVE-2021-3496/" } ], "title": "Security update for jhead", "tracking": { "current_release_date": "2021-05-19T16:05:20Z", "generator": { "date": "2021-05-19T16:05:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:0752-1", "initial_release_date": "2021-05-19T16:05:20Z", "revision_history": [ { "date": "2021-05-19T16:05:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-bp152.4.6.1.aarch64", "product": { "name": "jhead-3.06.0.1-bp152.4.6.1.aarch64", "product_id": "jhead-3.06.0.1-bp152.4.6.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-bp152.4.6.1.ppc64le", "product": { "name": "jhead-3.06.0.1-bp152.4.6.1.ppc64le", "product_id": "jhead-3.06.0.1-bp152.4.6.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-bp152.4.6.1.s390x", "product": { "name": "jhead-3.06.0.1-bp152.4.6.1.s390x", "product_id": "jhead-3.06.0.1-bp152.4.6.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-bp152.4.6.1.x86_64", "product": { "name": "jhead-3.06.0.1-bp152.4.6.1.x86_64", "product_id": "jhead-3.06.0.1-bp152.4.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15 SP2", "product": { "name": "SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-bp152.4.6.1.aarch64 as component of SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64" }, "product_reference": "jhead-3.06.0.1-bp152.4.6.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-bp152.4.6.1.ppc64le as component of SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le" }, "product_reference": "jhead-3.06.0.1-bp152.4.6.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-bp152.4.6.1.s390x as component of SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x" }, "product_reference": "jhead-3.06.0.1-bp152.4.6.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-bp152.4.6.1.x86_64 as component of SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" }, "product_reference": "jhead-3.06.0.1-bp152.4.6.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3822" } ], "notes": [ { "category": "general", "text": "exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3822", "url": "https://www.suse.com/security/cve/CVE-2016-3822" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2016-3822", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2016-3822", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "low" } ], "title": "CVE-2016-3822" }, { "cve": "CVE-2018-16554", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16554" } ], "notes": [ { "category": "general", "text": "The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because of inconsistency between float and double in a sprintf format string during TAG_GPS_ALT handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16554", "url": "https://www.suse.com/security/cve/CVE-2018-16554" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2018-16554", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2018-16554", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "low" } ], "title": "CVE-2018-16554" }, { "cve": "CVE-2018-17088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17088" } ], "notes": [ { "category": "general", "text": "The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because there is an integer overflow during a check for whether a location exceeds the EXIF data length. This is analogous to the CVE-2016-3822 integer overflow in exif.c. This gpsinfo.c vulnerability is unrelated to the CVE-2018-16554 gpsinfo.c vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17088", "url": "https://www.suse.com/security/cve/CVE-2018-17088" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2018-17088", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2018-17088", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "low" } ], "title": "CVE-2018-17088" }, { "cve": "CVE-2018-6612", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6612" } ], "notes": [ { "category": "general", "text": "An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6612", "url": "https://www.suse.com/security/cve/CVE-2018-6612" }, { "category": "external", "summary": "SUSE Bug 1079349 for CVE-2018-6612", "url": "https://bugzilla.suse.com/1079349" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "moderate" } ], "title": "CVE-2018-6612" }, { "cve": "CVE-2019-1010301", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1010301" } ], "notes": [ { "category": "general", "text": "jhead 3.03 is affected by: Buffer Overflow. The impact is: Denial of service. The component is: gpsinfo.c Line 151 ProcessGpsInfo(). The attack vector is: Open a specially crafted JPEG file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1010301", "url": "https://www.suse.com/security/cve/CVE-2019-1010301" }, { "category": "external", "summary": "SUSE Bug 1144316 for CVE-2019-1010301", "url": "https://bugzilla.suse.com/1144316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "low" } ], "title": "CVE-2019-1010301" }, { "cve": "CVE-2019-1010302", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1010302" } ], "notes": [ { "category": "general", "text": "jhead 3.03 is affected by: Incorrect Access Control. The impact is: Denial of service. The component is: iptc.c Line 122 show_IPTC(). The attack vector is: the victim must open a specially crafted JPEG file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1010302", "url": "https://www.suse.com/security/cve/CVE-2019-1010302" }, { "category": "external", "summary": "SUSE Bug 1144354 for CVE-2019-1010302", "url": "https://bugzilla.suse.com/1144354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "low" } ], "title": "CVE-2019-1010302" }, { "cve": "CVE-2020-6624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-6624" } ], "notes": [ { "category": "general", "text": "jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-6624", "url": "https://www.suse.com/security/cve/CVE-2020-6624" }, { "category": "external", "summary": "SUSE Bug 1160547 for CVE-2020-6624", "url": "https://bugzilla.suse.com/1160547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "important" } ], "title": "CVE-2020-6624" }, { "cve": "CVE-2020-6625", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-6625" } ], "notes": [ { "category": "general", "text": "jhead through 3.04 has a heap-based buffer over-read in Get32s when called from ProcessGpsInfo in gpsinfo.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-6625", "url": "https://www.suse.com/security/cve/CVE-2020-6625" }, { "category": "external", "summary": "SUSE Bug 1160544 for CVE-2020-6625", "url": "https://bugzilla.suse.com/1160544" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "important" } ], "title": "CVE-2020-6625" }, { "cve": "CVE-2021-3496", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3496" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow was found in jhead in version 3.06 in Get16u() in exif.c when processing a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3496", "url": "https://www.suse.com/security/cve/CVE-2021-3496" }, { "category": "external", "summary": "SUSE Bug 1184756 for CVE-2021-3496", "url": "https://bugzilla.suse.com/1184756" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "important" } ], "title": "CVE-2021-3496" } ] }
opensuse-su-2024:10880-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "jhead-3.06.0.1-1.3 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the jhead-3.06.0.1-1.3 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10880", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10880-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3822 page", "url": "https://www.suse.com/security/cve/CVE-2016-3822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16554 page", "url": "https://www.suse.com/security/cve/CVE-2018-16554/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17088 page", "url": "https://www.suse.com/security/cve/CVE-2018-17088/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6612 page", "url": "https://www.suse.com/security/cve/CVE-2018-6612/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3496 page", "url": "https://www.suse.com/security/cve/CVE-2021-3496/" } ], "title": "jhead-3.06.0.1-1.3 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10880-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-1.3.aarch64", "product": { "name": "jhead-3.06.0.1-1.3.aarch64", "product_id": "jhead-3.06.0.1-1.3.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-1.3.ppc64le", "product": { "name": "jhead-3.06.0.1-1.3.ppc64le", "product_id": "jhead-3.06.0.1-1.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-1.3.s390x", "product": { "name": "jhead-3.06.0.1-1.3.s390x", "product_id": "jhead-3.06.0.1-1.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-1.3.x86_64", "product": { "name": "jhead-3.06.0.1-1.3.x86_64", "product_id": "jhead-3.06.0.1-1.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-1.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64" }, "product_reference": "jhead-3.06.0.1-1.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-1.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le" }, "product_reference": "jhead-3.06.0.1-1.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-1.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x" }, "product_reference": "jhead-3.06.0.1-1.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-1.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" }, "product_reference": "jhead-3.06.0.1-1.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3822" } ], "notes": [ { "category": "general", "text": "exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3822", "url": "https://www.suse.com/security/cve/CVE-2016-3822" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2016-3822", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2016-3822", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3822" }, { "cve": "CVE-2018-16554", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16554" } ], "notes": [ { "category": "general", "text": "The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because of inconsistency between float and double in a sprintf format string during TAG_GPS_ALT handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16554", "url": "https://www.suse.com/security/cve/CVE-2018-16554" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2018-16554", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2018-16554", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-16554" }, { "cve": "CVE-2018-17088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17088" } ], "notes": [ { "category": "general", "text": "The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because there is an integer overflow during a check for whether a location exceeds the EXIF data length. This is analogous to the CVE-2016-3822 integer overflow in exif.c. This gpsinfo.c vulnerability is unrelated to the CVE-2018-16554 gpsinfo.c vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17088", "url": "https://www.suse.com/security/cve/CVE-2018-17088" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2018-17088", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2018-17088", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-17088" }, { "cve": "CVE-2018-6612", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6612" } ], "notes": [ { "category": "general", "text": "An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6612", "url": "https://www.suse.com/security/cve/CVE-2018-6612" }, { "category": "external", "summary": "SUSE Bug 1079349 for CVE-2018-6612", "url": "https://bugzilla.suse.com/1079349" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-6612" }, { "cve": "CVE-2021-3496", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3496" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow was found in jhead in version 3.06 in Get16u() in exif.c when processing a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3496", "url": "https://www.suse.com/security/cve/CVE-2021-3496" }, { "category": "external", "summary": "SUSE Bug 1184756 for CVE-2021-3496", "url": "https://bugzilla.suse.com/1184756" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3496" } ] }
fkie_cve-2018-6612
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272 | Third Party Advisory | |
cve@mitre.org | https://launchpad.net/ubuntu/+source/jhead/1:3.00-6 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.net/ubuntu/+source/jhead/1:3.00-6 | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
jhead_project | jhead | 3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jhead_project:jhead:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "44A93050-5580-44C1-B5DE-D45C1771E888", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact." }, { "lang": "es", "value": "Un error de subdesbordamiento de enteros en la funci\u00f3n process_EXIF del archivo exif.c en jhead 3.00 eleva una sobrelectura de b\u00fafer basada en memoria din\u00e1mica (heap) al procesar un archivo JPEG malicioso. Esto podr\u00eda permitir que un atacante remoto provoque un ataque de denegaci\u00f3n de servicio (DoS) u otro tipo de impacto sin especificar." } ], "id": "CVE-2018-6612", "lastModified": "2024-11-21T04:10:59.727", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-04T15:29:00.237", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://launchpad.net/ubuntu/+source/jhead/1:3.00-6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://launchpad.net/ubuntu/+source/jhead/1:3.00-6" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-191" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2018-6612
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-6612", "description": "An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact.", "id": "GSD-2018-6612", "references": [ "https://www.suse.com/security/cve/CVE-2018-6612.html", "https://advisories.mageia.org/CVE-2018-6612.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-6612" ], "details": "An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact.", "id": "GSD-2018-6612", "modified": "2023-12-13T01:22:35.766522Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-6612", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272", "refsource": "CONFIRM", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272" }, { "name": "https://launchpad.net/ubuntu/+source/jhead/1:3.00-6", "refsource": "CONFIRM", "url": "https://launchpad.net/ubuntu/+source/jhead/1:3.00-6" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:jhead_project:jhead:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-6612" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-191" } ] } ] }, "references": { "reference_data": [ { "name": "https://launchpad.net/ubuntu/+source/jhead/1:3.00-6", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://launchpad.net/ubuntu/+source/jhead/1:3.00-6" }, { "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } }, "lastModifiedDate": "2020-08-24T17:37Z", "publishedDate": "2018-02-04T15:29Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.