{"id":"USN-6098-1","summary":"Jhead vulnerabilities","details":"It was discovered that Jhead did not properly handle certain crafted images\nwhile processing the JFIF markers. An attacker could cause Jhead to crash. This\nissue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS.\n(CVE-2019-19035)\n\nIt was discovered that Jhead did not properly handle certain crafted images\nwhile processing longitude tags. An attacker could cause Jhead to crash. This\nissue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-1010301)\n\nIt was discovered that Jhead did not properly handle certain crafted images\nwhile processing IPTC data. An attacker could cause Jhead to crash. This\nissue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-1010302)\n\nBinbin Li discovered that Jhead did not properly handle certain crafted images\nwhile processing the DQT data. An attacker could cause Jhead to crash.\n(CVE-2020-6624)\n\nBinbin Li discovered that Jhead did not properly handle certain crafted images\nwhile processing longitude data. An attacker could cause Jhead to crash.\n(CVE-2020-6625)\n\nFeng Zhao Yang discovered that Jhead did not properly handle certain crafted\nimages while reading JPEG sections. An attacker could cause Jhead to crash.\n(CVE-2020-26208)\n\nIt was discovered that Jhead did not properly handle certain crafted images\nwhile processing Canon images. An attacker could cause Jhead to crash.\n(CVE-2021-28276)\n\nIt was discovered that Jhead did not properly handle certain crafted images\nwhen removing a certain type of sections. An attacker could cause Jhead to\ncrash. (CVE-2021-28278)\n","modified":"2026-02-10T04:43:08Z","published":"2023-05-23T14:23:32Z","related":["UBUNTU-CVE-2019-1010301","UBUNTU-CVE-2019-1010302","UBUNTU-CVE-2019-19035","UBUNTU-CVE-2020-26208","UBUNTU-CVE-2020-6624","UBUNTU-CVE-2020-6625","UBUNTU-CVE-2021-28276","UBUNTU-CVE-2021-28278"],"upstream":["CVE-2019-1010301","CVE-2019-1010302","CVE-2019-19035","CVE-2020-26208","CVE-2020-6624","CVE-2020-6625","CVE-2021-28276","CVE-2021-28278","UBUNTU-CVE-2019-1010301","UBUNTU-CVE-2019-1010302","UBUNTU-CVE-2019-19035","UBUNTU-CVE-2020-26208","UBUNTU-CVE-2020-6624","UBUNTU-CVE-2020-6625","UBUNTU-CVE-2021-28276","UBUNTU-CVE-2021-28278"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6098-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-19035"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-1010301"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-1010302"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6624"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6625"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-26208"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28276"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28278"}],"affected":[{"package":{"name":"jhead","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/jhead@1:2.97-1+deb8u2ubuntu0.1~esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.97-1+deb8u2ubuntu0.1~esm1"}]}],"versions":["1:2.97-1","1:2.97-1+deb8u1build0.14.04.1","1:2.97-1+deb8u2build0.14.04.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"jhead","binary_version":"1:2.97-1+deb8u2ubuntu0.1~esm1"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"id":"CVE-2019-19035","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6624","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6625","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-26208","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-28276","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-28278","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6098-1.json"}},{"package":{"name":"jhead","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/jhead@1:3.00-4+deb9u1ubuntu0.1~esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.00-4+deb9u1ubuntu0.1~esm1"}]}],"versions":["1:3.00-1","1:3.00-2","1:3.00-3","1:3.00-4+deb9u1build0.16.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"jhead","binary_version":"1:3.00-4+deb9u1ubuntu0.1~esm1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"id":"CVE-2019-19035","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-1010301","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2019-1010302","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2020-6624","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6625","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-26208","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-28276","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-28278","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6098-1.json"}},{"package":{"name":"jhead","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/jhead@1:3.00-8~ubuntu0.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.00-8~ubuntu0.1"}]}],"versions":["1:3.00-4","1:3.00-5","1:3.00-6","1:3.00-8~build0.18.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"jhead","binary_version":"1:3.00-8~ubuntu0.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"id":"CVE-2019-19035","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-1010301","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2019-1010302","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2020-6624","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6625","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-26208","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-28276","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-28278","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6098-1.json"}},{"package":{"name":"jhead","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/jhead@1:3.04-1ubuntu0.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.04-1ubuntu0.1"}]}],"versions":["1:3.03-3","1:3.04-1"],"ecosystem_specific":{"binaries":[{"binary_name":"jhead","binary_version":"1:3.04-1ubuntu0.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2020-6624","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6625","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-26208","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-28276","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-28278","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6098-1.json"}}],"schema_version":"1.7.3"}