Bug ID 1204409
Summary VUL-0: CVE-2022-41751: jhead: arbitrary OS commands by placing them in a JPEG filename
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.4
Hardware Other
URL https://smash.suse.de/issue/345422/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee sbrabec@suse.com
Reporter thomas.leroy@suse.com
QA Contact security-team@suse.de
Found By Security Response Team
Blocker ---

rh#2135591

Jhead 3.06.0.1 allows attackers to execute arbitrary OS commands by placing
them in a JPEG filename and then using the regeneration -rgt50 option.

Reference:

https://github.com/Matthias-Wandel/jhead/blob/63ce118c6a59ea64ac357236a11a47aaf569d622/jhead.c#L788
https://github.com/Matthias-Wandel/jhead/pull/57

References:
https://bugzilla.redhat.com/show_bug.cgi?id=2135591
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41751
https://www.cve.org/CVERecord?id=CVE-2022-41751
https://github.com/Matthias-Wandel/jhead/blob/63ce118c6a59ea64ac357236a11a47aaf569d622/jhead.c#L788
https://github.com/Matthias-Wandel/jhead/pull/57
https://github.com/Matthias-Wandel/jhead


You are receiving this mail because: