[Bug 1921301] [NEW] heap overflow

2021-03-24 Thread XiaoyuHe
Public bug reported:

# enviroment
ubuntu 18.04
./jhead poc

# version
3.04

# asan out
=
==34259==ERROR: AddressSanitizer: heap-buffer-overflow on address 
0x61100106 at pc 0x55e0a14147a5 bp 0x7ffcd8d72e80 sp 0x7ffcd8d72e70
READ of size 1 at 0x61100106 thread T0
#0 0x55e0a14147a4 in show_IPTC iptc.c:136
#1 0x55e0a13ec8bb in ProcessFile jhead.c:955
#2 0x55e0a13e7b2e in main jhead.c:1756
#3 0x7fa81c777bf6 in __libc_start_main 
(/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#4 0x55e0a13ea279 in _start (/home/fuzz/jhead-3.04/jhead+0x12279)

0x61100106 is located 0 bytes to the right of 198-byte region 
[0x61100040,0x61100106)
allocated by thread T0 here:
#0 0x7fa81cfc3b40 in __interceptor_malloc 
(/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40)
#1 0x55e0a13f3d6b in ReadJpegSections jpgfile.c:173

SUMMARY: AddressSanitizer: heap-buffer-overflow iptc.c:136 in show_IPTC
Shadow bytes around the buggy address:
  0x0c227fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c227fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c227fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c227fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
  0x0c227fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c227fff8020:[06]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c227fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c227fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c227fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c227fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c227fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:   00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:   fa
  Freed heap region:   fd
  Stack left redzone:  f1
  Stack mid redzone:   f2
  Stack right redzone: f3
  Stack after return:  f5
  Stack use after scope:   f8
  Global redzone:  f9
  Global init order:   f6
  Poisoned by user:f7
  Container overflow:  fc
  Array cookie:ac
  Intra object redzone:bb
  ASan internal:   fe
  Left alloca redzone: ca
  Right alloca redzone:cb
==34259==ABORTING

** Affects: jhead (Ubuntu)
 Importance: Undecided
 Status: New

** Attachment added: "poc file"
   https://bugs.launchpad.net/bugs/1921301/+attachment/5480683/+files/poc1

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921301

Title:
  heap overflow

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1921301/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1921302] [NEW] heap overflow

2021-03-24 Thread XiaoyuHe
Public bug reported:

# enviroment
ubuntu 18.04
./jhead poc

# version
3.04

# asan out
==39578==ERROR: AddressSanitizer: heap-buffer-overflow on address 
0x61d009cb at pc 0x56303aa75a88 bp 0x7fffb2c2ccf0 sp 0x7fffb2c2cce0
READ of size 1 at 0x61d009cb thread T0
#0 0x56303aa75a87 in Get32s exif.c:339
#1 0x56303aa8bcf9 in ProcessGpsInfo gpsinfo.c:138
#2 0x56303aa7e4d5 in ProcessExifDir exif.c:866
#3 0x56303aa7f95a in process_EXIF exif.c:1041
#4 0x56303aa6b382 in ReadJpegSections jpgfile.c:287
#5 0x56303aa6c90e in ReadJpegSections jpgfile.c:126
#6 0x56303aa6c90e in ReadJpegFile jpgfile.c:379
#7 0x56303aa6266c in ProcessFile jhead.c:905
#8 0x56303aa5db2e in main jhead.c:1756
#9 0x7f21c1797bf6 in __libc_start_main 
(/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#10 0x56303aa60279 in _start (/home/fuzz/jhead-3.04/jhead+0x12279)

0x61d009cb is located 0 bytes to the right of 2379-byte region 
[0x61d00080,0x61d009cb)
allocated by thread T0 here:
#0 0x7f21c1fe3b40 in __interceptor_malloc 
(/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40)
#1 0x56303aa69d6b in ReadJpegSections jpgfile.c:173

SUMMARY: AddressSanitizer: heap-buffer-overflow exif.c:339 in Get32s
Shadow bytes around the buggy address:
  0x0c3a7fff80e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c3a7fff80f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c3a7fff8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c3a7fff8110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c3a7fff8120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c3a7fff8130: 00 00 00 00 00 00 00 00 00[03]fa fa fa fa fa fa
  0x0c3a7fff8140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c3a7fff8150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c3a7fff8160: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c3a7fff8170: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c3a7fff8180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:   00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:   fa
  Freed heap region:   fd
  Stack left redzone:  f1
  Stack mid redzone:   f2
  Stack right redzone: f3
  Stack after return:  f5
  Stack use after scope:   f8
  Global redzone:  f9
  Global init order:   f6
  Poisoned by user:f7
  Container overflow:  fc
  Array cookie:ac
  Intra object redzone:bb
  ASan internal:   fe
  Left alloca redzone: ca
  Right alloca redzone:cb
==39578==ABORTING

** Affects: jhead (Ubuntu)
 Importance: Undecided
 Status: New

** Attachment added: "poc file"
   https://bugs.launchpad.net/bugs/1921302/+attachment/5480692/+files/poc2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921302

Title:
  heap overflow

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1921302/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1921303] [NEW] heap overflow

2021-03-24 Thread XiaoyuHe
Public bug reported:

# enviroment
ubuntu 18.04
./jhead poc

# version
3.04

# asan out
=
==33010==ERROR: AddressSanitizer: heap-buffer-overflow on address 
0x619004e5 at pc 0x5618aeedc758 bp 0x7ffe61a1d410 sp 0x7ffe61a1d400
READ of size 1 at 0x619004e5 thread T0
#0 0x5618aeedc757 in Get16u exif.c:325
#1 0x5618aeef223e in ProcessGpsInfo gpsinfo.c:62
#2 0x5618aeee54d5 in ProcessExifDir exif.c:866
#3 0x5618aeee5529 in ProcessExifDir exif.c:852
#4 0x5618aeee695a in process_EXIF exif.c:1041
#5 0x5618aeed2382 in ReadJpegSections jpgfile.c:287
#6 0x5618aeed390e in ReadJpegSections jpgfile.c:126
#7 0x5618aeed390e in ReadJpegFile jpgfile.c:379
#8 0x5618aeec966c in ProcessFile jhead.c:905
#9 0x5618aeec4b2e in main jhead.c:1756
#10 0x7f9cfffb1bf6 in __libc_start_main 
(/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#11 0x5618aeec7279 in _start (/home/fuzz/jhead-3.04/jhead+0x12279)

0x619004e5 is located 1 bytes to the right of 1124-byte region 
[0x61900080,0x619004e4)
allocated by thread T0 here:
#0 0x7f9d007fdb40 in __interceptor_malloc 
(/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40)
#1 0x5618aeed0d6b in ReadJpegSections jpgfile.c:173

SUMMARY: AddressSanitizer: heap-buffer-overflow exif.c:325 in Get16u
Shadow bytes around the buggy address:
  0x0c327fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c327fff8050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c327fff8060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c327fff8070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c327fff8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c327fff8090: 00 00 00 00 00 00 00 00 00 00 00 00[04]fa fa fa
  0x0c327fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c327fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c327fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c327fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c327fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:   00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:   fa
  Freed heap region:   fd
  Stack left redzone:  f1
  Stack mid redzone:   f2
  Stack right redzone: f3
  Stack after return:  f5
  Stack use after scope:   f8
  Global redzone:  f9
  Global init order:   f6
  Poisoned by user:f7
  Container overflow:  fc
  Array cookie:ac
  Intra object redzone:bb
  ASan internal:   fe
  Left alloca redzone: ca
  Right alloca redzone:cb
==33010==ABORTING

** Affects: jhead (Ubuntu)
 Importance: Undecided
 Status: New

** Attachment added: "poc file"
   https://bugs.launchpad.net/bugs/1921303/+attachment/5480697/+files/poc3

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921303

Title:
  heap overflow

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1921303/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1921304] [NEW] over read

2021-03-24 Thread XiaoyuHe
Public bug reported:

# enviroment
ubuntu 18.04
./jhead poc

# version
3.04

# asan out
ASAN:DEADLYSIGNAL
=
==10836==ERROR: AddressSanitizer: SEGV on unknown address 0x62452108 (pc 
0x55bba233d316 bp 0x0fff9bb96ac2 sp 0x7ffcddcb5570 T0)
==10836==The signal is caused by a READ memory access.
#0 0x55bba233d315 in ProcessGpsInfo gpsinfo.c:122
#1 0x55bba232f4d5 in ProcessExifDir exif.c:866
#2 0x55bba233095a in process_EXIF exif.c:1041
#3 0x55bba231c382 in ReadJpegSections jpgfile.c:287
#4 0x55bba231d90e in ReadJpegSections jpgfile.c:126
#5 0x55bba231d90e in ReadJpegFile jpgfile.c:379
#6 0x55bba231366c in ProcessFile jhead.c:905
#7 0x55bba230eb2e in main jhead.c:1756
#8 0x7f785c448bf6 in __libc_start_main 
(/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#9 0x55bba2311279 in _start (/home/fuzz/jhead-3.04/jhead+0x12279)

AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV gpsinfo.c:122 in ProcessGpsInfo
==10836==ABORTING

** Affects: jhead (Ubuntu)
 Importance: Undecided
 Status: New

** Attachment added: "poc4"
   https://bugs.launchpad.net/bugs/1921304/+attachment/5480701/+files/poc4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921304

Title:
  over read

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1921304/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1921305] [NEW] heap overflow

2021-03-24 Thread XiaoyuHe
Public bug reported:

# enviroment
ubuntu 18.04
./jhead poc

# version
3.04

# asan out
=
==27663==ERROR: AddressSanitizer: heap-buffer-overflow on address 
0x61d00a08 at pc 0x562527b27ea8 bp 0x7ffe2a994bb0 sp 0x7ffe2a994ba0
READ of size 1 at 0x61d00a08 thread T0
#0 0x562527b27ea7 in ProcessGpsInfo gpsinfo.c:126
#1 0x562527b194d5 in ProcessExifDir exif.c:866
#2 0x562527b1a95a in process_EXIF exif.c:1041
#3 0x562527b06382 in ReadJpegSections jpgfile.c:287
#4 0x562527b0790e in ReadJpegSections jpgfile.c:126
#5 0x562527b0790e in ReadJpegFile jpgfile.c:379
#6 0x562527afd66c in ProcessFile jhead.c:905
#7 0x562527af8b2e in main jhead.c:1756
#8 0x7f3c2ea7fbf6 in __libc_start_main 
(/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#9 0x562527afb279 in _start (/home/fuzz/jhead-3.04/jhead+0x12279)

0x61d00a08 is located 66 bytes to the right of 2374-byte region 
[0x61d00080,0x61d009c6)
allocated by thread T0 here:
#0 0x7f3c2f2cbb40 in __interceptor_malloc 
(/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40)
#1 0x562527b04d6b in ReadJpegSections jpgfile.c:173

SUMMARY: AddressSanitizer: heap-buffer-overflow gpsinfo.c:126 in ProcessGpsInfo
Shadow bytes around the buggy address:
  0x0c3a7fff80f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c3a7fff8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c3a7fff8110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c3a7fff8120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c3a7fff8130: 00 00 00 00 00 00 00 00 06 fa fa fa fa fa fa fa
=>0x0c3a7fff8140: fa[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c3a7fff8150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c3a7fff8160: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c3a7fff8170: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c3a7fff8180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c3a7fff8190: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:   00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:   fa
  Freed heap region:   fd
  Stack left redzone:  f1
  Stack mid redzone:   f2
  Stack right redzone: f3
  Stack after return:  f5
  Stack use after scope:   f8
  Global redzone:  f9
  Global init order:   f6
  Poisoned by user:f7
  Container overflow:  fc
  Array cookie:ac
  Intra object redzone:bb
  ASan internal:   fe
  Left alloca redzone: ca
  Right alloca redzone:cb
==27663==ABORTING

** Affects: jhead (Ubuntu)
 Importance: Undecided
 Status: New

** Attachment added: "poc5"
   https://bugs.launchpad.net/bugs/1921305/+attachment/5480703/+files/poc5

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921305

Title:
  heap overflow

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1921305/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1920605] Re: heap overflow

2021-03-23 Thread XiaoyuHe
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1920605

Title:
  heap overflow

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1920605/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1920606] Re: heap overflow

2021-03-23 Thread XiaoyuHe
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1920606

Title:
  heap overflow

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1920606/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1920607] Re: heap overflow

2021-03-23 Thread XiaoyuHe
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1920607

Title:
  heap overflow

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1920607/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1920617] Re: heap overflow

2021-03-23 Thread XiaoyuHe
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1920617

Title:
  heap overflow

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1920617/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1920616] Re: heap overflow

2021-03-23 Thread XiaoyuHe
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1920616

Title:
  heap overflow

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1920616/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1920618] Re: heap overflow

2021-03-23 Thread XiaoyuHe
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1920618

Title:
  heap overflow

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1920618/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1920605] [NEW] heap overflow

2021-03-20 Thread XiaoyuHe
Public bug reported:

# enviroment
ubuntu 18.04
./jhead poc

# version
3.04

# asan out
==6757==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61200144 
at pc 0x56033e019b38 bp 0x7ffe9162eb20 sp 0x7ffe9162eb10
READ of size 1 at 0x61200144 thread T0
#0 0x56033e019b37 in process_DQT jpgqguess.c:111
#1 0x56033e0128e2 in ReadJpegSections jpgfile.c:223
#2 0x56033e01490e in ReadJpegSections jpgfile.c:126
#3 0x56033e01490e in ReadJpegFile jpgfile.c:379
#4 0x56033e00a66c in ProcessFile jhead.c:905
#5 0x56033e005b2e in main jhead.c:1756
#6 0x7f5889de2bf6 in __libc_start_main 
(/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#7 0x56033e008279 in _start (/home/fuzz/jhead-3.04/jhead+0x12279)

0x61200144 is located 0 bytes to the right of 260-byte region 
[0x61200040,0x61200144)
allocated by thread T0 here:
#0 0x7f588a62eb40 in __interceptor_malloc 
(/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40)
#1 0x56033e011d6b in ReadJpegSections jpgfile.c:173

SUMMARY: AddressSanitizer: heap-buffer-overflow jpgqguess.c:111 in process_DQT
Shadow bytes around the buggy address:
  0x0c247fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c247fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c247fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c247fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
  0x0c247fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c247fff8020: 00 00 00 00 00 00 00 00[04]fa fa fa fa fa fa fa
  0x0c247fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c247fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c247fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c247fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c247fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:   00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:   fa
  Freed heap region:   fd
  Stack left redzone:  f1
  Stack mid redzone:   f2
  Stack right redzone: f3
  Stack after return:  f5
  Stack use after scope:   f8
  Global redzone:  f9
  Global init order:   f6
  Poisoned by user:f7
  Container overflow:  fc
  Array cookie:ac
  Intra object redzone:bb
  ASan internal:   fe
  Left alloca redzone: ca
  Right alloca redzone:cb
==6757==ABORTING

** Affects: jhead (Ubuntu)
 Importance: Undecided
 Status: New

** Attachment added: "poc file"
   https://bugs.launchpad.net/bugs/1920605/+attachment/5478474/+files/poc3

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1920605

Title:
  heap overflow

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1920605/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs