Bug 1108672 - (CVE-2018-17088) VUL-0: CVE-2018-17088: jhead: Integer overflow in gpsinfo.c while running jhead
(CVE-2018-17088)
VUL-0: CVE-2018-17088: jhead: Integer overflow in gpsinfo.c while running jhead
Status: RESOLVED FIXED
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Security
Leap 15.0
Other Other
: P3 - Medium : Minor (vote)
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/214938/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-09-17 14:17 UTC by Alexander Bergmann
Modified: 2020-01-18 23:39 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2018-09-17 14:17:35 UTC
rh#1629662

The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because there is an integer overflow during a check for whether a location exceeds the EXIF data length. This is analogous to the CVE-2016-3822 integer overflow in exif.c. This gpsinfo.c vulnerability is unrelated to the CVE-2018-16554 gpsinfo.c vulnerability.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1629662
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907925
Comment 1 Markéta Machová 2018-10-08 11:10:16 UTC
It looks like there is an inconsistence between our and Debian Bugzilla, it would be pleasant to fix it.

I found this Debian patch: https://sources.debian.org/src/jhead/1:3.00-8/debian/patches/32_crash_in_gpsinfo/, which says it fixes the bug.

But the same issue was already fixed by Stanislav: https://build.opensuse.org/package/view_file/openSUSE:Leap:15.1/jhead/CVE-2018-16554.patch?expand=1, but this is a fix of https://bugzilla.suse.com/show_bug.cgi?id=CVE-2018-16554.

Debian fix of CVE-2018-16554 is https://sources.debian.org/src/jhead/1:3.00-8/debian/patches/33_fix_908176/, we do not have this patch yet.

Please tell me what is wrong here.
Comment 2 Swamp Workflow Management 2018-10-24 09:00:13 UTC
This is an autogenerated message for OBS integration:
This bug (1108672) was mentioned in
https://build.opensuse.org/request/show/644192 Backports:SLE-15 / jhead
Comment 3 Swamp Workflow Management 2018-10-24 09:40:09 UTC
This is an autogenerated message for OBS integration:
This bug (1108672) was mentioned in
https://build.opensuse.org/request/show/644203 15.0+Backports:SLE-15 / jhead
Comment 4 Markéta Machová 2018-10-24 09:49:43 UTC
Fixed

Factory: https://build.opensuse.org/request/show/644189
openSUSE and SLE backports: https://build.opensuse.org/request/show/644211
Comment 5 Swamp Workflow Management 2018-10-26 12:42:49 UTC
openSUSE-SU-2018:3481-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 1108480,1108672
CVE References: CVE-2018-16554,CVE-2018-17088
Sources used:
openSUSE Leap 42.3 (src):    jhead-3.00-14.1
openSUSE Leap 15.0 (src):    jhead-3.00-lp150.3.6.1
openSUSE Backports SLE-15 (src):    jhead-3.00-bp150.3.7.1
Comment 6 Marcus Meissner 2018-11-02 18:35:12 UTC
done