http://bugzilla.opensuse.org/show_bug.cgi?id=1204409 Bug ID: 1204409 Summary: VUL-0: CVE-2022-41751: jhead: arbitrary OS commands by placing them in a JPEG filename Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.4 Hardware: Other URL: https://smash.suse.de/issue/345422/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: sbrabec@suse.com Reporter: thomas.leroy@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- rh#2135591 Jhead 3.06.0.1 allows attackers to execute arbitrary OS commands by placing them in a JPEG filename and then using the regeneration -rgt50 option. Reference: https://github.com/Matthias-Wandel/jhead/blob/63ce118c6a59ea64ac357236a11a47... https://github.com/Matthias-Wandel/jhead/pull/57 References: https://bugzilla.redhat.com/show_bug.cgi?id=2135591 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41751 https://www.cve.org/CVERecord?id=CVE-2022-41751 https://github.com/Matthias-Wandel/jhead/blob/63ce118c6a59ea64ac357236a11a47... https://github.com/Matthias-Wandel/jhead/pull/57 https://github.com/Matthias-Wandel/jhead -- You are receiving this mail because: You are on the CC list for the bug.