Source: https://code.google.com/p/google-security-research/issues/detail?id=500
There is a crash when the Samsung Gallery application load the attached GIF, colormap.gif.
D/skia(10905): GIF - Parse error
D/skia(10905): --- decoder->decode returned false
F/libc(10905): Fatal signal 11 (SIGSEGV), code 2, fault addr 0x89f725ac in tid 11276 (thread-pool-0)
I/DEBUG ( 2958): pid: 10905, tid: 11276, name: thread-pool-0>>> com.sec.android.gallery3d <<<
I/DEBUG ( 2958): signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x89f725ac
I/DEBUG ( 2958): x0 0000000000000001x1 0000000089f725acx2 0000000000000000x3 00000000fff9038c
I/DEBUG ( 2958): x4 0000007f9c300000x5 000000000000001fx6 0000000000000001x7 0000007f9c620048
I/DEBUG ( 2958): x8 0000000000000000x9 0000000000000000x100000000000000080x110000000000003758
I/DEBUG ( 2958): x120000000000000020x130000000000000020x1400000000000000a5x15000000000000001f
I/DEBUG ( 2958): x1600000000ffffe4e3x1700000000000000a5x180000007f9c300000x190000007f9c61fc00
I/DEBUG ( 2958): x200000007f9c664080x210000000089e76b2cx22000000000000003bx230000000000000001
I/DEBUG ( 2958): x240000000000000020x250000000000000020x260000000000000020x270000007f9c664080
I/DEBUG ( 2958): x2800000000000001dax290000000032e89ae0x300000007faad70e64
I/DEBUG ( 2958): sp 0000007f9cfff170pc 0000007faad72dbcpstate 0000000080000000
I/DEBUG ( 2958):
I/DEBUG ( 2958): backtrace:
I/DEBUG ( 2958): #00 pc 000000000002ddbc/system/lib64/libSecMMCodec.so (ColorMap+200)
I/DEBUG ( 2958): #01 pc 000000000002be60/system/lib64/libSecMMCodec.so (decodeGIF+340)
I/DEBUG ( 2958): #02 pc 000000000000c90c/system/lib64/libSecMMCodec.so (Java_com_sec_samsung_gallery_decoder_SecMMCodecInterface_nativeDecode+436)
I/DEBUG ( 2958): #03 pc 000000000042ec00/system/priv-app/SecGallery2015/arm64/SecGallery2015.odex
To reproduce, download the file and open it in Gallery
Proof of Concept:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38610.zip