{"id":1948,"date":"2017-08-05T13:35:38","date_gmt":"2017-08-05T11:35:38","guid":{"rendered":"http:\/\/blogs.gentoo.org\/ago\/?p=1948"},"modified":"2017-08-18T15:47:19","modified_gmt":"2017-08-18T13:47:19","slug":"graphicsmagick-invalid-memory-read-in-setimagecolorcallback-image-c","status":"publish","type":"post","link":"https:\/\/blogs.gentoo.org\/ago\/2017\/08\/05\/graphicsmagick-invalid-memory-read-in-setimagecolorcallback-image-c\/","title":{"rendered":"graphicsmagick: invalid memory read in SetImageColorCallBack (image.c)"},"content":{"rendered":"<p><strong>Description<\/strong>:<br \/>\n<a href=\"http:\/\/www.graphicsmagick.org\/\">graphicsmagick<\/a> is a collection of tools and libraries for many image formats.<\/p>\n<p>The complete ASan output of the issue:<\/p>\n<pre><font size=\"2\"># gm convert -clip -negate $FILE out\r\n==11324==ERROR: AddressSanitizer: SEGV on unknown address 0x7f9ccac18000 (pc 0x7f9dbacf58ce bp 0x7ffec95349c0 sp 0x7ffec9534980 T0)\r\n    #0 0x7f9dbacf58cd in SetImageColorCallBack \/var\/tmp\/portage\/media-gfx\/graphicsmagick-1.3.26\/work\/GraphicsMagick-1.3.26\/magick\/image.c:2090:15\r\n    #1 0x7f9dbaf16bbd in .omp_outlined..4 \/var\/tmp\/portage\/media-gfx\/graphicsmagick-1.3.26\/work\/GraphicsMagick-1.3.26\/magick\/pixel_iterator.c:378:23\r\n    #2 0x7f9dbaf11873 in PixelIterateMonoModifyImplementation \/var\/tmp\/portage\/media-gfx\/graphicsmagick-1.3.26\/work\/GraphicsMagick-1.3.26\/magick\/pixel_iterator.c:348:33\r\n    #3 0x7f9dbaf111be in PixelIterateMonoSet \/var\/tmp\/portage\/media-gfx\/graphicsmagick-1.3.26\/work\/GraphicsMagick-1.3.26\/magick\/pixel_iterator.c:415:10\r\n    #4 0x7f9dbacf379b in SetImageEx \/var\/tmp\/portage\/media-gfx\/graphicsmagick-1.3.26\/work\/GraphicsMagick-1.3.26\/magick\/image.c:2125:10\r\n    #5 0x7f9db448bc86 in ReadMNGImage \/var\/tmp\/portage\/media-gfx\/graphicsmagick-1.3.26\/work\/GraphicsMagick-1.3.26\/coders\/png.c:5016:26\r\n    #6 0x7f9dbaa14e88 in ReadImage \/var\/tmp\/portage\/media-gfx\/graphicsmagick-1.3.26\/work\/GraphicsMagick-1.3.26\/magick\/constitute.c:1607:13\r\n    #7 0x7f9dba8a7f18 in ConvertImageCommand \/var\/tmp\/portage\/media-gfx\/graphicsmagick-1.3.26\/work\/GraphicsMagick-1.3.26\/magick\/command.c:4348:22\r\n    #8 0x7f9dba8e40c5 in MagickCommand \/var\/tmp\/portage\/media-gfx\/graphicsmagick-1.3.26\/work\/GraphicsMagick-1.3.26\/magick\/command.c:8869:17\r\n    #9 0x7f9dba98f85b in GMCommandSingle \/var\/tmp\/portage\/media-gfx\/graphicsmagick-1.3.26\/work\/GraphicsMagick-1.3.26\/magick\/command.c:17396:10\r\n    #10 0x7f9dba98c991 in GMCommand \/var\/tmp\/portage\/media-gfx\/graphicsmagick-1.3.26\/work\/GraphicsMagick-1.3.26\/magick\/command.c:17449:16\r\n    #11 0x7f9db91f7680 in __libc_start_main \/var\/tmp\/portage\/sys-libs\/glibc-2.23-r4\/work\/glibc-2.23\/csu\/..\/csu\/libc-start.c:289\r\n    #12 0x419cd8 in _init (\/usr\/bin\/gm+0x419cd8)\r\n\r\nAddressSanitizer can not provide additional info.\r\nSUMMARY: AddressSanitizer: SEGV \/var\/tmp\/portage\/media-gfx\/graphicsmagick-1.3.26\/work\/GraphicsMagick-1.3.26\/magick\/image.c:2090:15 in SetImageColorCallBack\r\n==11324==ABORTING\r\n<\/font><\/pre>\n<p><strong>Affected version:<\/strong><br \/>\n1.3.26<\/p>\n<p><strong>Fixed version:<\/strong><br \/>\nN\/A<\/p>\n<p><strong>Commit fix:<\/strong><br \/>\n<a href=\"http:\/\/hg.code.sf.net\/p\/graphicsmagick\/code\/rev\/cd699a44f188\">http:\/\/hg.code.sf.net\/p\/graphicsmagick\/code\/rev\/cd699a44f188<\/a><\/p>\n<p><strong>Credit:<\/strong><br \/>\nThis bug was discovered by Agostino Sarubbo of Gentoo.<\/p>\n<p><strong>CVE:<\/strong><br \/>\nCVE-2017-12935<\/p>\n<p><strong>Reproducer:<\/strong><br \/>\n<a href=\"https:\/\/github.com\/asarubbo\/poc\/blob\/master\/00303-graphicsmagick-invalidread-SetImageColorCallBack\">https:\/\/github.com\/asarubbo\/poc\/blob\/master\/00303-graphicsmagick-invalidread-SetImageColorCallBack<\/a><\/p>\n<p><strong>Timeline:<\/strong><br \/>\n2017-07-12: bug discovered and reported to upstream<br \/>\n2017-07-26: upstream released a fix<br \/>\n2017-08-05: blog post about the issue<br \/>\n2017-08-18: CVE assigned<\/p>\n<p><strong>Note:<\/strong><br \/>\nThis bug was found with <a href=\"http:\/\/lcamtuf.coredump.cx\/afl\">American Fuzzy Lop<\/a>.<br \/>\nThis bug was identified with bare metal servers donated by <a href=\"https:\/\/www.packet.net\/\">Packet<\/a>. This work is also supported by the <a href=\"https:\/\/www.coreinfrastructure.org\">Core Infrastructure Initiative<\/a>.<\/p>\n<p><strong>Permalink:<\/strong><\/p>\n<blockquote data-secret=\"xxgwhrtf5c\" class=\"wp-embedded-content\"><p><a href=\"http:\/\/blogs.gentoo.org\/ago\/2017\/08\/05\/graphicsmagick-invalid-memory-read-in-setimagecolorcallback-image-c\/\">graphicsmagick: invalid memory read in SetImageColorCallBack (image.c)<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"http:\/\/blogs.gentoo.org\/ago\/2017\/08\/05\/graphicsmagick-invalid-memory-read-in-setimagecolorcallback-image-c\/embed\/#?secret=xxgwhrtf5c\" data-secret=\"xxgwhrtf5c\" width=\"600\" height=\"338\" title=\"&#8220;graphicsmagick: invalid memory read in SetImageColorCallBack (image.c)&#8221; &#8212; agostino&#039;s blog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description: graphicsmagick is a collection of tools and libraries for many image formats. The complete ASan output of the issue: # gm convert -clip -negate $FILE out ==11324==ERROR: AddressSanitizer: SEGV on unknown address 0x7f9ccac18000 (pc 0x7f9dbacf58ce bp 0x7ffec95349c0 sp 0x7ffec9534980 &hellip; <a href=\"https:\/\/blogs.gentoo.org\/ago\/2017\/08\/05\/graphicsmagick-invalid-memory-read-in-setimagecolorcallback-image-c\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":140,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[12,10],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2EaBc-vq","_links":{"self":[{"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/posts\/1948"}],"collection":[{"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/users\/140"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/comments?post=1948"}],"version-history":[{"count":4,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/posts\/1948\/revisions"}],"predecessor-version":[{"id":2055,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/posts\/1948\/revisions\/2055"}],"wp:attachment":[{"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/media?parent=1948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/categories?post=1948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/tags?post=1948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}