Identify if we have the software, in 16.09, 17.03, and unstable. Then determine if we are vulnerable, and make a comment with your findings. It can also be helpful to specify if you think there is a patch, or if it can be fixed via a general update.
Example:
unstable: we are not vulnerable (link to the package)
17.03: we are vulnerable (link to the package)
16.09: we don't have it packaged
IMPORTANT: If you believe there are possibly related issues, bring them up on the parent issue!
Patching
Start by commenting on this issue saying you're working on a patch. This way, we don't duplicate work.
If you open a pull request, tag this issue and the master issue for the roundup.
If you commit the patch directly to a branch, please leave a comment on this issue with the branch and the commit hash, example:
Sun, 16 Oct 2016 20:52:31 +0200 Agostino Sarubbo , 11022030.6ZF3cfAM3U@arcadia
A note outside the blog post:
This issue does not affect any library, but it is only in the mujstest binary.
There aren't known applications which use mujstest, but if you have an
application or website which relies on mujstest you are invited to apply the
patch or use the newer package when it will be released. Thanks.
Description:
Mujstest, which is part of mupdf is a scriptable tester for mupdf + js.
A fuzzing revealed a global buffer overflow write.
The complete ASan output:
# mujstest $FILE
==1278==ERROR: AddressSanitizer: global-buffer-overflow on address
0x0000013c7280 at pc 0x0000004fa432 bp 0x7ffea75837d0 sp 0x7ffea75837c8
WRITE of size 1 at 0x0000013c7280 thread T0
#0 0x4fa431 in my_getline /var/tmp/portage/app-
text/mupdf-1.9a/work/mupdf-1.9a/platform/x11/jstest_main.c:214:5
#1 0x4fa431 in main /var/tmp/portage/app-
text/mupdf-1.9a/work/mupdf-1.9a/platform/x11/jstest_main.c:335
#2 0x7fb62229661f in __libc_start_main /var/tmp/portage/sys-
libs/glibc-2.22-r4/work/glibc-2.22/csu/libc-start.c:289
#3 0x41ade8 in _init (/usr/bin/mujstest+0x41ade8)
0x0000013c7280 is located 0 bytes to the right of global variable
'getline_buffer' defined in 'platform/x11/jstest_main.c:24:13' (0x13c6280) of
size 4096
SUMMARY: AddressSanitizer: global-buffer-overflow /var/tmp/portage/app-
text/mupdf-1.9a/work/mupdf-1.9a/platform/x11/jstest_main.c:214:5 in my_getline
Shadow bytes around the buggy address:
0x000080270e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x000080270e10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x000080270e20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x000080270e30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x000080270e40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x000080270e50:[f9]f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
0x000080270e60: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
0x000080270e70: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
0x000080270e80: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
0x000080270e90: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
0x000080270ea0: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==1278==ABORTING
Affected version:
1.9a
Fixed version:
1.10 (not yet released)
Commit fix:
http://git.ghostscript.com/?p=mupdf.git;h=446097f97b71ce20fa8d1e45e070f2e62676003e
Credit:
This bug was discovered by Agostino Sarubbo of Gentoo.
CVE:
N/A
Timeline:
2016-08-04: bug discovered
2016-08-05: bug reported to upstream
2016-09-22: upstream released a patch
2016-09-24: blog post about the issue
Note:
This bug was found with American Fuzzy Lop.
Permalink:
https://blogs.gentoo.org/ago/2016/09/24/mupdf-mujstest-global-buffer-overflow-in-my_getline-jstest_main-c/
--
Agostino Sarubbo
Gentoo Linux Developer
Mon, 13 Mar 2017 11:27:50 +0100 Agostino Sarubbo , 1933450.huz7fftLl8@blackgate
On Sunday 16 October 2016 20:52:31 Agostino Sarubbo wrote:
> Permalink:
> https://blogs.gentoo.org/ago/2016/09/24/mupdf-mujstest-global-buffer-overflo
> w-in-my_getline-jstest_main-c/
This is CVE-2016-10247
--
Agostino Sarubbo
Gentoo Linux Developer
Here is a report from the oss-security mailing list for Vulnerability Roundup 27.
Skip to First Email
Instructions:
Identification
Identify if we have the software, in 16.09, 17.03, and unstable. Then determine if we are vulnerable, and make a comment with your findings. It can also be helpful to specify if you think there is a patch, or if it can be fixed via a general update.
Example:
IMPORTANT: If you believe there are possibly related issues, bring them up on the parent issue!
Patching
Start by commenting on this issue saying you're working on a patch. This way, we don't duplicate work.
If you open a pull request, tag this issue and the master issue for the roundup.
If you commit the patch directly to a branch, please leave a comment on this issue with the branch and the commit hash, example:
Skip to First Email
Upon Completion ...
Info
Triage Indicator:
Should the search term be changed from
mupdf
? Suggest a new package search by commenting:Known CVEs: CVE-2016-10247
Skip to End
Sun, 16 Oct 2016 20:52:31 +0200 Agostino Sarubbo,
11022030.6ZF3cfAM3U@arcadia
Skip to End
Mon, 13 Mar 2017 11:27:50 +0100 Agostino Sarubbo,
1933450.huz7fftLl8@blackgate
Skip to End