Bugzilla – Full Text Bug Listing |
Summary: | VUL-1: CVE-2016-2317,CVE-2016-2318: GraphicsMagick: Multiple vulnerabilities when parsing and processing SVG files | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Sebastian Krahmer <krahmer> |
Component: | Incidents | Assignee: | Petr Gajdos <pgajdos> |
Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
Severity: | Normal | ||
Priority: | P4 - Low | CC: | meissner, security-team |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
Whiteboard: | CVSSv2:RedHat:CVE-2016-2317:4.3:(AV:N/AC:M/Au:N/C:N/I:N/A:P) CVSSv2:SUSE:CVE-2016-2317:4.3:(AV:N/AC:M/Au:N/C:N/I:N/A:P) CVSSv2:RedHat:CVE-2016-2318:4.3:(AV:N/AC:M/Au:N/C:N/I:N/A:P) CVSSv2:SUSE:CVE-2016-2318:4.3:(AV:N/AC:M/Au:N/C:N/I:N/A:P) | ||
Found By: | --- | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Attachments: | Reproducers |
Description
Sebastian Krahmer
2016-02-09 13:19:39 UTC
Created attachment 664923 [details]
Reproducers
Reproducers from attachment
>AddressSanitizer: heap-buffer-overflow >WRITE of size 8 > #0 0x5a892b in TracePoint magick/render.c:5125 > >AddressSanitizer: stack-buffer-overflow >WRITE of size 1 > #0 0x60ba3a in GetToken magick/utility.c:2638 > >AddressSanitizer: heap-buffer-overflow on address >WRITE of size 8 > #0 0x93c004 in GetTransformTokens coders/svg.c:361 Use CVE-2016-2317 for this set of three issues. >AddressSanitizer: SEGV on unknown address 0x000000000000 > #0 0x59866a in DrawImage magick/render.c:2999 > >AddressSanitizer: SEGV on unknown address 0x000000000000 > #0 0x945793 in SVGStartElement coders/svg.c:1757 > >AddressSanitizer: SEGV on unknown address 0x000000000000 > #0 0x5a396c in TraceArcPath magick/render.c:4550 Use CVE-2016-2318 for this set of three issues. Okay, lowering priority also. Tested on 11: $ gm convert 1.svg bleble.jpg Segmentation fault (core dumped) $ gm convert 2.svg bleble.jpg Segmentation fault (core dumped) $ gm convert 3.svg bleble.jpg gm convert: Unable to open file (mdj) [No such file or directory]. $ gm convert 4.svg bleble.jpg Segmentation fault (core dumped) $ gm convert 5.svg bleble.jpg Segmentation fault (core dumped) $ gm convert 6.svg bleble.jpg Segmentation fault (core dumped) $ (I have renamed testcases alphabetical order -> natural number.) Tested on factory: $ gm convert 1.svg bleble.jpg gm convert: invalid primitive argument (-7.8248073938802944in). $ gm convert 2.svg bleble.jpg gm convert: Extra content at the end of the document . $ gm convert 3.svg bleble.jpg gm convert: invalid primitive argument (-2.453152686783691cm). $ gm convert 4.svg bleble.jpg gm convert: invalid primitive argument (-9.010965059851289mm). $ gm convert 5.svg bleble.jpg gm convert: invalid primitive argument (-67%). $ gm convert 6.svg bleble.jpg gm convert: Non-conforming drawing primitive definition (push). $ Tested on 13.2: $ gm convert 1.svg bleble.jpg Segmentation fault (core dumped) $ gm convert 2.svg bleble.jpg Segmentation fault (core dumped) $ gm convert 3.svg bleble.jpg *** Error in `gm': free(): invalid pointer: 0x0000000000c72d10 *** ======= Backtrace: ========= /lib64/libc.so.6(+0x7278f)[0x7f5c9745d78f] /lib64/libc.so.6(+0x77ffe)[0x7f5c97462ffe] /usr/lib64/GraphicsMagick-1.3.20/modules-Q16/coders/svg.so(+0x5b25)[0x7f5c94fa4b25] /usr/lib64/libxml2.so.2(xmlParseStartTag+0x425)[0x7f5c94c77b05] /usr/lib64/libxml2.so.2(+0x531ac)[0x7f5c94c851ac] /usr/lib64/libxml2.so.2(xmlParseChunk+0x2de)[0x7f5c94c8618e] /usr/lib64/GraphicsMagick-1.3.20/modules-Q16/coders/svg.so(+0x8464)[0x7f5c94fa7464] /usr/lib64/libGraphicsMagick-Q16.so.3(ReadImage+0x1d5)[0x7f5c97a3abb5] /usr/lib64/libGraphicsMagick-Q16.so.3(ConvertImageCommand+0x238)[0x7f5c97a181f8] /usr/lib64/libGraphicsMagick-Q16.so.3(MagickCommand+0x155)[0x7f5c97a076b5] /usr/lib64/libGraphicsMagick-Q16.so.3(+0x597e6)[0x7f5c97a087e6] /usr/lib64/libGraphicsMagick-Q16.so.3(GMCommand+0x2e)[0x7f5c97a2ddae] /lib64/libc.so.6(__libc_start_main+0xf5)[0x7f5c9740cb05] gm[0x40063e] ======= Memory map: ======== Aborted (core dumped) $ gm convert 4.svg bleble.jpg Segmentation fault (core dumped) $ gm convert 5.svg bleble.jpg Segmentation fault (core dumped) $ gm convert 6.svg bleble.jpg Segmentation fault (core dumped) $ Now to find the commits. Probably: CVE-2016-2317 http://hg.code.sf.net/p/graphicsmagick/code/rev/44ed8318ba6a CVE-2016-2318 http://hg.code.sf.net/p/graphicsmagick/code/rev/52b59d2ef4a1 http://hg.code.sf.net/p/graphicsmagick/code/rev/1d46a279aca6 AFTER in 13.2 $ gm convert 1.svg in-love-security-team.jpg gm convert: Negative or zero image size. $ gm convert 2.svg in-love-security-team.jpg gm convert: Extra content at the end of the document . $ gm convert 3.svg in-love-security-team.jpg gm convert: Negative or zero image size. $ gm convert 4.svg in-love-security-team.jpg gm convert: Negative or zero image size. $ gm convert 5.svg in-love-security-team.jpg gm convert: Negative or zero image size. $ gm convert 6.svg in-love-security-team.jpg gm convert: Negative or zero image size. $ AFTER huge but almost simple patching, 11 have: $ gm convert 1.svg even-more-love-to-security-team.jpg gm convert: Negative or zero image size. $ gm convert 2.svg even-more-love-to-security-team.jpg gm convert: Extra content at the end of the document . $ gm convert 3.svg even-more-love-to-security-team.jpg gm convert: Negative or zero image size. $ gm convert 4.svg even-more-love-to-security-team.jpg gm convert: Negative or zero image size. $ gm convert 5.svg even-more-love-to-security-team.jpg gm convert: Negative or zero image size. $ gm convert 6.svg even-more-love-to-security-team.jpg gm convert: Negative or zero image size. $ I believe all fixed. openSUSE-SU-2016:1724-1: An update that fixes 37 vulnerabilities is now available. Category: security (important) Bug References: 965853,983234,983259,983309,983455,983521,983523,983533,983752,983794,983796,983799,983803,984028,984032,984035,984135,984142,984144,984145,984150,984166,984181,984193,984372,984373,984375,984379,984394,984398,984400,984408,984409,984433,984436,985442 CVE References: CVE-2014-9805,CVE-2014-9807,CVE-2014-9808,CVE-2014-9809,CVE-2014-9810,CVE-2014-9811,CVE-2014-9813,CVE-2014-9814,CVE-2014-9815,CVE-2014-9816,CVE-2014-9817,CVE-2014-9818,CVE-2014-9819,CVE-2014-9820,CVE-2014-9828,CVE-2014-9829,CVE-2014-9830,CVE-2014-9831,CVE-2014-9834,CVE-2014-9835,CVE-2014-9837,CVE-2014-9839,CVE-2014-9840,CVE-2014-9844,CVE-2014-9845,CVE-2014-9846,CVE-2014-9847,CVE-2014-9853,CVE-2015-8894,CVE-2015-8896,CVE-2015-8901,CVE-2015-8903,CVE-2016-2317,CVE-2016-2318,CVE-2016-5240,CVE-2016-5241,CVE-2016-5688 Sources used: openSUSE 13.2 (src): GraphicsMagick-1.3.20-9.1 SUSE-SU-2016:1783-1: An update that fixes 37 vulnerabilities is now available. Category: security (important) Bug References: 965853,983234,983259,983309,983455,983521,983523,983533,983752,983794,983796,983799,983803,984028,984032,984035,984135,984142,984144,984145,984150,984166,984181,984193,984372,984373,984375,984379,984394,984398,984400,984408,984409,984433,984436,985442 CVE References: CVE-2014-9805,CVE-2014-9807,CVE-2014-9808,CVE-2014-9809,CVE-2014-9810,CVE-2014-9811,CVE-2014-9813,CVE-2014-9814,CVE-2014-9815,CVE-2014-9816,CVE-2014-9817,CVE-2014-9818,CVE-2014-9819,CVE-2014-9820,CVE-2014-9828,CVE-2014-9829,CVE-2014-9830,CVE-2014-9831,CVE-2014-9834,CVE-2014-9835,CVE-2014-9837,CVE-2014-9839,CVE-2014-9840,CVE-2014-9844,CVE-2014-9845,CVE-2014-9846,CVE-2014-9847,CVE-2014-9853,CVE-2015-8894,CVE-2015-8896,CVE-2015-8901,CVE-2015-8903,CVE-2016-2317,CVE-2016-2318,CVE-2016-5240,CVE-2016-5241,CVE-2016-5688 Sources used: SUSE Studio Onsite 1.3 (src): GraphicsMagick-1.2.5-4.41.1 SUSE Linux Enterprise Software Development Kit 11-SP4 (src): GraphicsMagick-1.2.5-4.41.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): GraphicsMagick-1.2.5-4.41.1 openSUSE-SU-2016:2073-1: An update that fixes 22 vulnerabilities is now available. Category: security (important) Bug References: 965853,983309,983455,983521,983523,983533,983752,983794,983799,984142,984145,984150,984166,984372,984375,984379,984394,984400,984408,984436,985442 CVE References: CVE-2014-9805,CVE-2014-9807,CVE-2014-9809,CVE-2014-9815,CVE-2014-9817,CVE-2014-9819,CVE-2014-9820,CVE-2014-9831,CVE-2014-9834,CVE-2014-9835,CVE-2014-9837,CVE-2014-9839,CVE-2014-9845,CVE-2014-9846,CVE-2014-9853,CVE-2015-8894,CVE-2015-8896,CVE-2016-2317,CVE-2016-2318,CVE-2016-5240,CVE-2016-5241,CVE-2016-5688 Sources used: openSUSE Leap 42.1 (src): GraphicsMagick-1.3.21-11.1 |