Debian Bug report logs -
#1022028
jhead: CVE-2022-41751
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Joachim Reichel <reichel@debian.org>
:
Bug#1022028
; Package src:jhead
.
(Wed, 19 Oct 2022 07:57:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Joachim Reichel <reichel@debian.org>
.
(Wed, 19 Oct 2022 07:57:06 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: jhead
Version: 1:3.06.0.1-2
Severity: grave
Tags: security upstream
Forwarded: https://github.com/Matthias-Wandel/jhead/pull/57
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Hi,
The following vulnerability was published for jhead.
CVE-2022-41751[0]:
| Jhead 3.06.0.1 allows attackers to execute arbitrary OS commands by
| placing them in a JPEG filename and then using the regeneration -rgt50
| option.
From context I'm not yet really conviced we need a DSA for it, as a
user needs to be tricked into processing a specially crafted filename.
keeping RC severity though to make sure the fix land in bookworm.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2022-41751
https://www.cve.org/CVERecord?id=CVE-2022-41751
[1] https://github.com/Matthias-Wandel/jhead/pull/57
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
Information forwarded
to debian-bugs-dist@lists.debian.org, Joachim Reichel <reichel@debian.org>
:
Bug#1022028
; Package src:jhead
.
(Wed, 19 Oct 2022 08:48:03 GMT) (full text, mbox, link).
Message #8 received at 1022028@bugs.debian.org (full text, mbox, reply):
* Salvatore Bonaccorso <carnil@debian.org>, 2022-10-19 09:53:
>[1] https://github.com/Matthias-Wandel/jhead/pull/57
This fix is incomplete:
https://github.com/Matthias-Wandel/jhead/issues/60
--
Jakub Wilk
Information forwarded
to debian-bugs-dist@lists.debian.org, Joachim Reichel <reichel@debian.org>
:
Bug#1022028
; Package src:jhead
.
(Wed, 19 Oct 2022 12:51:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
Extra info received and forwarded to list. Copy sent to Joachim Reichel <reichel@debian.org>
.
(Wed, 19 Oct 2022 12:51:02 GMT) (full text, mbox, link).
Message #15 received at 1022028@bugs.debian.org (full text, mbox, reply):
Hi Jakub,
On Wed, Oct 19, 2022 at 10:45:22AM +0200, Jakub Wilk wrote:
> * Salvatore Bonaccorso <carnil@debian.org>, 2022-10-19 09:53:
> > [1] https://github.com/Matthias-Wandel/jhead/pull/57
>
> This fix is incomplete:
> https://github.com/Matthias-Wandel/jhead/issues/60
Thanks for having reported this upstream.
Salvatore
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Oct 19 13:23:18 2022;
Machine Name:
bembo
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.