jhead 3.03 is affected by: Buffer Overflow. The impact is: Denial of service. The component is: gpsinfo.c Line 151 ProcessGpsInfo(). The attack vector is: Open a specially crafted JPEG file.Referenceshttps://bugzilla.redhat.com/show_bug.cgi?id=1679952https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1838251https://launchpadlibrarian.net/435112680/32_crash_in_gpsinfohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WVQTORTGQE56XXC6OVHQCSCUGABRMQZ/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTGUHTJTQ6EKEPDXFSKZKVLUJC4UAPBQ/https://lists.debian.org/debian-lts-announce/2019/12/msg00037.htmlhttps://security.gentoo.org/glsa/202007-17