DSA-5294-1 jhead -- security update

Related Vulnerabilities: CVE-2021-34055   CVE-2022-41751  

Jhead, a tool for manipulating EXIF data embedded in JPEG images, allowed attackers to execute arbitrary OS commands by placing them in a JPEG filename and then using the regeneration -rgt50, -autorot or -ce option. In addition a buffer overflow error in exif.c has been addressed which could lead to a denial of service (application crash). For the stable distribution (bullseye), these problems have been fixed in version 1:3.04-6+deb11u1. We recommend that you upgrade your jhead packages. For the detailed security status of jhead please refer to its security tracker page at: https://security-tracker.debian.org/tracker/jhead

Debian Security Advisory

DSA-5294-1 jhead -- security update

Date Reported:
04 Dec 2022
Affected Packages:
jhead
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 1024272, Bug 1022028.
In Mitre's CVE dictionary: CVE-2021-34055, CVE-2022-41751.
More information:

Jhead, a tool for manipulating EXIF data embedded in JPEG images, allowed attackers to execute arbitrary OS commands by placing them in a JPEG filename and then using the regeneration -rgt50, -autorot or -ce option. In addition a buffer overflow error in exif.c has been addressed which could lead to a denial of service (application crash).

For the stable distribution (bullseye), these problems have been fixed in version 1:3.04-6+deb11u1.

We recommend that you upgrade your jhead packages.

For the detailed security status of jhead please refer to its security tracker page at: https://security-tracker.debian.org/tracker/jhead