heap-buffer-overflow of exif.c in function Put16u

Bug #1929145 reported by xiao huang
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
jhead (Ubuntu)
New
Undecided
Unassigned

Bug Description

Hello Ubuntu Security Team

I used aflfuzzer to test jhead and found a overflow vulnerabilities.I mentioned issues

- https://github.com/Matthias-Wandel/jhead/issues/36

info:
ubuntu 20.04 TLS
```
$ sudo apt search jhead
Sorting... Done
Full Text Search... Done
jhead/focal 1:3.04-1 amd64
  manipulate the non-image part of Exif compliant JPEG files

```

Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0

Source code jhead version 3.06 commit 78057ab115e7fe68ba18869f97240cba58b9e996

Thank

Revision history for this message
xiao huang (shanzhuli) wrote :
  • poc Edit (42.6 KiB, application/zip)
information type: Private Security → Public Security
Revision history for this message
Seth Arnold (seth-arnold) wrote :

Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

tags: added: community-security
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Bug attachments

Remote bug watches

Bug watches keep track of this bug in other bug trackers.