Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
CVE-2020-6624
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2020-6624
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-6624.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-6624
Downstream
DEBIAN-CVE-2020-6624
UBUNTU-CVE-2020-6624
USN-6098-1
openSUSE-SU-2021:0743-1
openSUSE-SU-2021:0752-1
Related
MGASA-2021-0328
openSUSE-SU-2021:0743-1
openSUSE-SU-2021:0752-1
Published
2020-01-09T01:15:16Z
Modified
2025-08-09T19:01:28Z
Severity
7.1 (High)
CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
CVSS Calculator
Summary
[none]
Details
jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess.c.
References
https://bugs.gentoo.org/711220#c3
https://bugs.gentoo.org/876247#c0
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1858744
https://security.gentoo.org/glsa/202007-17
Affected packages
CVE-2020-6624 - OSV