{"id":755,"date":"2016-10-18T16:37:16","date_gmt":"2016-10-18T14:37:16","guid":{"rendered":"http:\/\/blogs.gentoo.org\/ago\/?p=755"},"modified":"2016-10-23T09:40:10","modified_gmt":"2016-10-23T07:40:10","slug":"jasper-null-pointer-dereference-in-jp2_colr_destroy-jp2_cod-c","status":"publish","type":"post","link":"https:\/\/blogs.gentoo.org\/ago\/2016\/10\/18\/jasper-null-pointer-dereference-in-jp2_colr_destroy-jp2_cod-c\/","title":{"rendered":"jasper: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c)"},"content":{"rendered":"<p><strong>Description<\/strong>:<br \/>\n<a href=\"http:\/\/www.ece.uvic.ca\/~frodo\/jasper\/\">jasper<\/a> is an open-source initiative to provide a free software-based reference implementation of the codec specified in the JPEG-2000 Part-1 standard.<\/p>\n<p>Another round of fuzzing on an updated version (1.900.5) revealed a NULL pointer access in jp2_colr_destroy<\/p>\n<p>The complete ASan output:<\/p>\n<pre><font size=\"2\"># imginfo -f $FILE\r\ncannot copy box data                                                                                                                                                                                                                                                           \r\nASAN:DEADLYSIGNAL                                                                                                                                                                                                                                                              \r\n=================================================================                                                                                                                                                                                                              \r\n==19664==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000041defd bp 0xbebebebebebebebe sp 0x7ffc50768570 T0)                                                                                                                                        \r\n    #0 0x41defc in atomic_compare_exchange_strong \/var\/tmp\/portage\/sys-devel\/llvm-3.8.1-r2\/work\/llvm-3.8.1.src\/projects\/compiler-rt\/lib\/asan\/..\/sanitizer_common\/sanitizer_atomic_clang.h:81                                                      \r\n    #1 0x41defc in __asan::Allocator::AtomicallySetQuarantineFlag(__asan::AsanChunk*, void*, __sanitizer::BufferedStackTrace*) \/var\/tmp\/portage\/sys-devel\/llvm-3.8.1-r2\/work\/llvm-3.8.1.src\/projects\/compiler-rt\/lib\/asan\/asan_allocator.cc:465                                \r\n    #2 0x41defc in __asan::Allocator::Deallocate(void*, unsigned long, __sanitizer::BufferedStackTrace*, __asan::AllocType) \/var\/tmp\/portage\/sys-devel\/llvm-3.8.1-r2\/work\/llvm-3.8.1.src\/projects\/compiler-rt\/lib\/asan\/asan_allocator.cc:525                                   \r\n    #3 0x41defc in __asan::asan_free(void*, __sanitizer::BufferedStackTrace*, __asan::AllocType) \/var\/tmp\/portage\/sys-devel\/llvm-3.8.1-r2\/work\/llvm-3.8.1.src\/projects\/compiler-rt\/lib\/asan\/asan_allocator.cc:709                                                              \r\n    #4 0x4c008c in free \/var\/tmp\/portage\/sys-devel\/llvm-3.8.1-r2\/work\/llvm-3.8.1.src\/projects\/compiler-rt\/lib\/asan\/asan_malloc_linux.cc:41                                                                                                                                     \r\n    #5 0x7f8dcb5bc940 in jp2_colr_destroy \/tmp\/portage\/media-libs\/jasper-1.900.5\/work\/jasper-1.900.5\/src\/libjasper\/jp2\/jp2_cod.c:443:3                                                                                                                                         \r\n    #6 0x7f8dcb5c1f69 in jp2_box_destroy \/tmp\/portage\/media-libs\/jasper-1.900.5\/work\/jasper-1.900.5\/src\/libjasper\/jp2\/jp2_cod.c:211:3                                                                                                                                          \r\n    #7 0x7f8dcb5c1f69 in jp2_box_get \/tmp\/portage\/media-libs\/jasper-1.900.5\/work\/jasper-1.900.5\/src\/libjasper\/jp2\/jp2_cod.c:307                                                                                                                                                \r\n    #8 0x7f8dcb5c5dc0 in jp2_decode \/tmp\/portage\/media-libs\/jasper-1.900.5\/work\/jasper-1.900.5\/src\/libjasper\/jp2\/jp2_dec.c:156:16                                                                                                                                              \r\n    #9 0x7f8dcb556f39 in jas_image_decode \/tmp\/portage\/media-libs\/jasper-1.900.5\/work\/jasper-1.900.5\/src\/libjasper\/base\/jas_image.c:380:16                                                                                                                                     \r\n    #10 0x4f1686 in main \/tmp\/portage\/media-libs\/jasper-1.900.5\/work\/jasper-1.900.5\/src\/appl\/imginfo.c:188:16                                                                                                                                                                  \r\n    #11 0x7f8dca66561f in __libc_start_main \/var\/tmp\/portage\/sys-libs\/glibc-2.22-r4\/work\/glibc-2.22\/csu\/libc-start.c:289                                                                                                                                                       \r\n    #12 0x418e68 in _init (\/usr\/bin\/imginfo+0x418e68)                                                                                                                                                                                                                          \r\n\r\nAddressSanitizer can not provide additional info.                                                                                                                                                                                                                              \r\nSUMMARY: AddressSanitizer: SEGV \/var\/tmp\/portage\/sys-devel\/llvm-3.8.1-r2\/work\/llvm-3.8.1.src\/projects\/compiler-rt\/lib\/asan\/..\/sanitizer_common\/sanitizer_atomic_clang.h:81 in atomic_compare_exchange_strong                                      \r\n==19664==ABORTING\r\n<\/font><\/pre>\n<p><strong>Affected version:<\/strong><br \/>\n1.900.5<\/p>\n<p><strong>Fixed version:<\/strong><br \/>\n1.900.10<\/p>\n<p><strong>Commit fix:<\/strong><br \/>\n<a href=\"https:\/\/github.com\/mdadams\/jasper\/commit\/e24bdc716c3327b067c551bc6cfb97fd2370358d\">https:\/\/github.com\/mdadams\/jasper\/commit\/e24bdc716c3327b067c551bc6cfb97fd2370358d<\/a><\/p>\n<p><strong>Credit:<\/strong><br \/>\nThis bug was discovered by Agostino Sarubbo of Gentoo.<\/p>\n<p><strong>CVE:<\/strong><br \/>\nCVE-2016-8887<\/p>\n<p><strong>Timeline:<\/strong><br \/>\n2016-10-17: bug discovered<br \/>\n2016-10-17: bug reported to upstream<br \/>\n2016-10-18: blog post about the issue<br \/>\n2016-10-21: upstream released a patch<br \/>\n2016-10-23: CVE assigned<\/p>\n<p><strong>Note:<\/strong><br \/>\nThis bug was found with <a href=\"http:\/\/lcamtuf.coredump.cx\/afl\">American Fuzzy Lop<\/a>.<\/p>\n<p><strong>Permalink:<\/strong><\/p>\n<blockquote data-secret=\"R2WETlpa1W\" class=\"wp-embedded-content\"><p><a href=\"http:\/\/blogs.gentoo.org\/ago\/2016\/10\/18\/jasper-null-pointer-dereference-in-jp2_colr_destroy-jp2_cod-c\/\">jasper: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c)<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"http:\/\/blogs.gentoo.org\/ago\/2016\/10\/18\/jasper-null-pointer-dereference-in-jp2_colr_destroy-jp2_cod-c\/embed\/#?secret=R2WETlpa1W\" data-secret=\"R2WETlpa1W\" width=\"600\" height=\"338\" title=\"&#8220;jasper: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c)&#8221; &#8212; agostino&#039;s blog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description: jasper is an open-source initiative to provide a free software-based reference implementation of the codec specified in the JPEG-2000 Part-1 standard. Another round of fuzzing on an updated version (1.900.5) revealed a NULL pointer access in jp2_colr_destroy The complete &hellip; <a href=\"https:\/\/blogs.gentoo.org\/ago\/2016\/10\/18\/jasper-null-pointer-dereference-in-jp2_colr_destroy-jp2_cod-c\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":140,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[12,10],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2EaBc-cb","_links":{"self":[{"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/posts\/755"}],"collection":[{"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/users\/140"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/comments?post=755"}],"version-history":[{"count":5,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/posts\/755\/revisions"}],"predecessor-version":[{"id":806,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/posts\/755\/revisions\/806"}],"wp:attachment":[{"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/media?parent=755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/categories?post=755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/tags?post=755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}