{"id":"MGASA-2020-0014","summary":"Updated jhead packages fix security vulnerabilities","details":"Updated jhead package fixes security vulnerabilities:\n\njhead 3.03 is affected by: heap-based buffer over-read. The impact is:\nDenial of service. The component is: ReadJpegSections and process_SOFn\nin jpgfile.c. The attack vector is: Open a specially crafted JPEG file\n(CVE-2019-19035).\n\nA vulnerability was found in jhead 3.03 is affected by: Buffer Overflow.\nThe impact is: Denial of service. The component is: gpsinfo.c Line 151\nProcessGpsInfo(). The attack vector is: Open a specially crafted JPEG\nfile (CVE-2019-1010301).\n\nA vulnerability was found in jhead 3.03 is affected by: Incorrect Access\nControl. The impact is: Denial of service. The component is: iptc.c Line\n122 show_IPTC(). The attack vector is: the victim must open a specially\ncrafted JPEG file (CVE-2019-1010302).\n","modified":"2026-01-30T07:58:01.226049Z","published":"2020-01-05T15:37:51Z","related":["CVE-2019-1010301","CVE-2019-1010302","CVE-2019-19035"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2020-0014.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=25938"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/3WVQTORTGQE56XXC6OVHQCSCUGABRMQZ/"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/GPNV43VBUCMUBRBKPJBY4DDSYLHQ2GFR/"}],"affected":[{"package":{"name":"jhead","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/jhead?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.04-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0014.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}