question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

RuntimeException thrown from ImageReaders

See original GitHub issue

Hi Harald.

Extracting relevant Exceptions wasn’t a very easy task, as the original log file is has 144471 lines. I had to do it in several steps using heavy regex’ing and manual labour 😉 As a result I can have made some errors or duplicated some Exceptions because my memory has it’s limitations.

First I filtered the original log file to exclude “non relevant” stuff. This is the filtered log file:

filteredDebug.txt

Hopefully you won’t need that, but I attach it in case you need some more context or I forgot something.

I then tried to extract “one instance” of what seemed to me like the same “bug”. The result of this is here:

extractedRuntimeExceptions.txt

The calling code is usually either the same as that in #329 or a normal read(). MemoryCacheImageInputStream is used exclusively.

@Sami32 Can you upload the exact files used in extractedRuntimeExceptions.txt? The file name in question is always the one described in the single line following the stack trace (Adding new child…).

Issue Analytics

  • State:closed
  • Created 7 years ago
  • Comments:7 (2 by maintainers)

github_iconTop GitHub Comments

2reactions
haraldkcommented, Nov 17, 2020

There were actually a few bugs hidden in there…

Thank you for your patience! 😉

– Harald K

1reaction
Nadaharcommented, Mar 8, 2017

The more I think about it the more I think it’s false positives. These images has been specificly crafted to challenge image decoders, producing invalid indexes and producing buffer overflow and underruns. The trojan reported was one that could be embedded in images exploiting a bug i Windows Media Player. It’s very likely, as I see it, that the technique employed by this trojan is some specially crafted buffer overflow injecting code that way. Some of the anti-virus software probably simply does a generic check for an image with the same buffer overflow characteristics without checking if there’s any actual malicious payload, and thus some of these images are flagged.

For the interested: How security flaws work the buffer overflow.

Read more comments on GitHub >

github_iconTop Results From Across the Web

ImageReader nodes throw RuntimeException when I try to ...
Hello, I am trying to get to grips with KNIME at the moment. My intent is to evaluate KNIME's existing capabilities and potential...
Read more >
RuntimeException (Java Platform SE 8 ) - Oracle Help Center
RuntimeException is the superclass of those exceptions that can be thrown during the normal operation of the Java Virtual Machine.
Read more >
javax.imageio.ImageReader.dispose java code examples
hasNext()) { throw new IOException("The image-based media type " + mediaType + "is not supported for reading"); } ImageReader reader = readers.next(); ...
Read more >
Runtime Error: No Image Reader for format: rle registered
public BufferedImage chargeImageDicomBufferise(File file, int value) throws IOException { Iterator<ImageReader> iter = ImageIO.
Read more >
Example usage for javax.imageio ImageReader read
In this page you can find the example usage for javax.imageio ImageReader read. ... catch (IOException e) { throw new RuntimeException("Failed to create...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found