[Bug 1160547] New: VUL-1: CVE-2020-6624: jhead: heap-based buffer over-read in process_DQT in jpgqguess.c
http://bugzilla.opensuse.org/show_bug.cgi?id=1160547 Bug ID: 1160547 Summary: VUL-1: CVE-2020-6624: jhead: heap-based buffer over-read in process_DQT in jpgqguess.c Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.3 Hardware: Other URL: https://smash.suse.de/issue/250646/ OS: Other Status: NEW Severity: Minor Priority: P5 - None Component: Security Assignee: sbrabec@suse.com Reporter: atoptsoglou@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- CVE-2020-6624 jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess.c. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-6624 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6624 https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1858744 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1160547 http://bugzilla.opensuse.org/show_bug.cgi?id=1160547#c4 --- Comment #4 from OBSbugzilla Bot <bwiedemann+obsbugzillabot@suse.com> --- This is an autogenerated message for OBS integration: This bug (1160547) was mentioned in https://build.opensuse.org/request/show/892517 15.2 / jhead -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1160547 http://bugzilla.opensuse.org/show_bug.cgi?id=1160547#c7 --- Comment #7 from OBSbugzilla Bot <bwiedemann+obsbugzillabot@suse.com> --- This is an autogenerated message for OBS integration: This bug (1160547) was mentioned in https://build.opensuse.org/request/show/990913 Backports:SLE-15-SP3 / jhead -- You are receiving this mail because: You are on the CC list for the bug.
participants (2)
-
bugzilla_noreply@novell.com
-
bugzilla_noreply@suse.com