Your message dated Sun, 08 Mar 2020 21:37:31 +0000 with message-id <[email protected]> and subject line Bug#953352: fixed in jhead 1:3.04-2 has caused the Debian Bug report #953352, regarding Heap-buffer-overflow in jhead-3.04 to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 953352: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953352 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: jhead Version: 3.04 A heap-buffer-overflow issue was discovered in jhead-3.04:gpsinfo.c:161. Please run following command to reproduce it, ./jhead poc Here is the detail log: $ ./jhead poc Nonfatal Error : 'poc' Extraneous 10 padding bytes before section E1 Nonfatal Error : 'poc' Illegal value pointer for tag 0100 in Exif Nonfatal Error : 'poc' Illegal value pointer for tag fe0f in Exif Nonfatal Error : 'poc' Illegal value pointer for tag 0110 in Exif ================================================================= ==29343==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb5e03e98 at pc 0x08059e85 bp 0xbffbf488 sp 0xbffbf478 READ of size 1 at 0xb5e03e98 thread T0 #0 0x8059e84 in ProcessGpsInfo /home/test/afl/jhead-3.04/gpsinfo.c:161 #1 0x8055a15 in ProcessExifDir /home/test/afl/jhead-3.04/exif.c:866 #2 0x8056260 in process_EXIF /home/test/afl/jhead-3.04/exif.c:1041 #3 0x804fdb8 in ReadJpegSections /home/test/afl/jhead-3.04/jpgfile.c:287 #4 0x8050190 in ReadJpegFile /home/test/afl/jhead-3.04/jpgfile.c:379 #5 0x804cad9 in ProcessFile /home/test/afl/jhead-3.04/jhead.c:905 #6 0x8049cfa in main /home/test/afl/jhead-3.04/jhead.c:1756 #7 0xb77b8636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636) #8 0x804b65b (/home/test/BinFuzz/jhead+0x804b65b) AddressSanitizer can not describe address in more detail (wild memory access suspected). SUMMARY: AddressSanitizer: heap-buffer-overflow /home/test/afl/jhead-3.04/gpsinfo.c:161 ProcessGpsInfo Shadow bytes around the buggy address: 0x36bc0780: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x36bc0790: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x36bc07a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x36bc07b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x36bc07c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x36bc07d0: fa fa fa[fa]fa fa fa fa fa fa fa fa fa fa fa fa 0x36bc07e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x36bc07f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x36bc0800: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x36bc0810: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x36bc0820: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==29343==ABORTING This issue was raised by binary-security-lab of Sichuan University, for fuzzing research work.
poc
Description: Binary data
--- End Message ---
--- Begin Message ---Source: jhead Source-Version: 1:3.04-2 Done: Ludovic Rousseau <[email protected]> We believe that the bug you reported is fixed in the latest version of jhead, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ludovic Rousseau <[email protected]> (supplier of updated jhead package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sun, 08 Mar 2020 22:20:20 +0100 Source: jhead Architecture: source Version: 1:3.04-2 Distribution: unstable Urgency: medium Maintainer: Ludovic Rousseau <[email protected]> Changed-By: Ludovic Rousseau <[email protected]> Closes: 953352 Changes: jhead (1:3.04-2) unstable; urgency=medium . * Fix "Heap-buffer-overflow in jhead-3.04" (Closes: #953352) patch in d/p/01_gpsinfo.c * d/control: Standards-Version: 4.3.0 -> 4.5.0. No change needed * d/control: use debhelper-compat (= 12) instead of level 11 * d/control: add Rules-Requires-Root: no Checksums-Sha1: e1a0665f2e664d173c2f17a9d8824045c6946a6f 1821 jhead_3.04-2.dsc 412b4288292b1f3f98020af41fc1a2655a822e01 6016 jhead_3.04-2.debian.tar.xz 15029cda50ec76c16b11ce3bee3821d8b77786d6 5691 jhead_3.04-2_amd64.buildinfo Checksums-Sha256: 264f5bf4145e7d7ee4d1b3ca5f3929f875fb66914f2bdf8fce0a4c51b418567f 1821 jhead_3.04-2.dsc 158a2d564e323e09ab9963f2c2877731b5fd8531055e885d52d70b0b417a15a7 6016 jhead_3.04-2.debian.tar.xz dc731e0d8c8ea28db1c0b0d60e82769aa3a60100e1a91f08f8ab657deef4cc97 5691 jhead_3.04-2_amd64.buildinfo Files: 4d3b539e55f2d54c0c918bd3a86a0cb2 1821 graphics optional jhead_3.04-2.dsc 794346ecac8cf8c7278236de4b9ca063 6016 graphics optional jhead_3.04-2.debian.tar.xz 291ba1b706951cf68a8d62c2a5df1e46 5691 graphics optional jhead_3.04-2_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iQJIBAEBCAAyFiEE9eEbn/6REUb0HZU9eKG03+j5xX4FAl5lYdsUHHJvdXNzZWF1 QGRlYmlhbi5vcmcACgkQeKG03+j5xX5BrRAAhgRSBjtutrK9woMkadI4ikOJhHVK j3EJNDtu6vxbVwuGg9tZGbKrWb3dvArbXE7i+W+rkNENT9J1uwtS4liWl4WsDvaM hW49WgDe9kmxKCX2kUP9zR/zVj1KpWzUymPmzgp/gtKZjv3NhXbXm+k2W+iWESTs jOhP3lgwo+e87lsZZiQl+EjVdD72juToDidwnnA7mr5AaO+6YIN192ExEwEq8buA OGtSRCglddI7FsCmU+gExCl9u8SSRySUhojhl0bYCmJYWyGBufQmDWeoLPPIaHqU JR7AgBehKr4MaOKFkKwgaVkLcEkyNXk1FJi448tZ25yDY/npGrzTUXXkkaT6sH12 icIS4hKQ8xeUnilPonCrWKF0aoH6zQX4/VGts2rU9oMvgfKScpSr25Idh/VJ31gZ L5zOuGP//2tFaXuqKD6FKcWqOKcEV7atXCDPe9zEDKoovCUmz87U9QlMv2rgY4oW 5eo4OkgsvfI0Ur/1TRzOog0QwdLuXVW13d690l18X9XAFt97IRkY6jh5ENPy3G1A Oqc0MH5YgJH8Ihemmf/C/JgXmBt5YBW3K5GiF0b9emcSwm5ph+iEOCQFp9zwSsYw RleLhE6Y+prn7HK3lxAXZ3zNCl5kq6eq5u6BDcgzu1EvbrqZMg+dLaKvEppdLkMW cv/Z/iPvkHumGCk= =Vt/6 -----END PGP SIGNATURE-----
--- End Message ---

