ALT-BU-2018-3670-1
Branch sisyphus update bulletin.
Closed bugs
Чёрный фон у некоторых элементов
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-16554
The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because of inconsistency between float and double in a sprintf format string during TAG_GPS_ALT handling.
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176
- [debian-lts-announce] 20191231 [SECURITY] [DLA 2054-1] jhead security update
- [debian-lts-announce] 20191231 [SECURITY] [DLA 2054-1] jhead security update
- https://nimo-zhang.github.io/2018/09/07/bug-analysis-1/#more
- https://nimo-zhang.github.io/2018/09/07/bug-analysis-1/#more
Modified: 2024-11-21
CVE-2018-17088
The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because there is an integer overflow during a check for whether a location exceeds the EXIF data length. This is analogous to the CVE-2016-3822 integer overflow in exif.c. This gpsinfo.c vulnerability is unrelated to the CVE-2018-16554 gpsinfo.c vulnerability.
Modified: 2024-11-21
CVE-2018-6612
An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact.
Closed bugs
gnumeric rebuild fails and blocks perl update.