New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 599865 link

Starred by 2 users

Issue metadata

Status: Fixed
Owner:
Closed: Oct 2016
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 1
Type: Bug-Security

Blocked on:
issue 594972



Sign in to add a comment

Heap-buffer-overflow in parse_encoding

Project Member Reported by ClusterFuzz, Apr 1 2016

Issue description

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6705835866062848

Fuzzer: aohelin_ni
Job Type: linux_asan_chrome_mp
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 1
Crash Address: 0x61900067a125
Crash State:
  parse_encoding
  parse_dict
  T1_Face_Init
  
Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=314095:314100

Minimized Testcase (4747.59 Kb): https://cluster-fuzz.appspot.com/download/AMIfv94saQs7rH-gMf2VapBIIN_3ovUlRnD6fE7bpCi-R2K5V6OQWcIyceScl3cUvRugBQznw90tatoYDS-4jR51dEfPzkHKghTrBNPk1GgP3QcdTGJyPcyLKtceDU6TBYXMaXWyXFh3MlbnSlY3n3R_qMPu64ttorXd1j-DvxQnKoVwdgsYz-E

Filer: mmoroz

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
 
Blockedon: 594972
Cc: mmo...@chromium.org
Owner: bunge...@chromium.org
Cc: -mmo...@chromium.org mmoroz@chromium.org
Oops, wrong CC, sorry.
Project Member

Comment 3 by ClusterFuzz, Apr 1 2016

Labels: Pri-1
Status: Assigned (was: Available)
Components: Blink>Fonts
Components: -Blink>Fonts Internals>Plugins>PDF
Labels: M-50
Project Member

Comment 7 by sheriffbot@chromium.org, Apr 21 2016

bungeman: Uh oh! This issue still open and hasn't been updated in the last 19 days. This is a serious vulnerability, and we want to ensure that there's progress. Could you please leave an update with the current status and any potential blockers?

If you're not the right owner for this issue, could you please remove yourself as soon as possible or help us find the right one?

If the issue is fixed or you can't reproduce it, please close the bug. If you've started working on a fix, please set the status to Started.

Thanks for your time! To disable nags, add the Disable-Nags label.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 8 by sheriffbot@chromium.org, May 6 2016

bungeman: Uh oh! This issue still open and hasn't been updated in the last 34 days. This is a serious vulnerability, and we want to ensure that there's progress. Could you please leave an update with the current status and any potential blockers?

If you're not the right owner for this issue, could you please remove yourself as soon as possible or help us find the right one?

If the issue is fixed or you can't reproduce it, please close the bug. If you've started working on a fix, please set the status to Started.

Thanks for your time! To disable nags, add the Disable-Nags label.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 9 by sheriffbot@chromium.org, May 26 2016

Labels: -M-50 M-51
Labels: -Security_Impact-Stable Security_Impact-None
Labels: -Security_Impact-None Security_Impact-Stable
Status: ExternalDependency (was: Assigned)
Discussed this offline. I'm going to mark this as Stable impacting rather than None. ExternalDependency is more appropriate.
Project Member

Comment 12 by sheriffbot@chromium.org, Jul 21 2016

Labels: -M-51 M-52
Project Member

Comment 13 by ClusterFuzz, Jul 31 2016

ClusterFuzz has detected this issue as fixed in range 408633:408661.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6705835866062848

Fuzzer: aohelin_ni
Job Type: linux_asan_chrome_mp
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 1
Crash Address: 0x61900067a125
Crash State:
  parse_encoding
  parse_dict
  T1_Face_Init
  
Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=314095:314100
Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=408633:408661

Unminimized Testcase: https://cluster-fuzz.appspot.com/download/AMIfv968ZCr0bkcHuPvTTnd-_znvGjWoSZGZFIWUdnRE9ZbGR-ajiooGx3v1YRaECU5M2Uzby0h0kcsiw2U5rWJH498fTmPWRJtINJAcJD_m7UaUqXXW9_prV8y_eBN1GEaKC6yiqZfSORzAi_lDrRSOtwV-shRlAeWNOMkOZ1CgVuk3O-AVULo?testcase_id=6705835866062848


See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 14 by ClusterFuzz, Jul 31 2016

Labels: ClusterFuzz-Verified
Status: Verified (was: ExternalDependency)
ClusterFuzz testcase is verified as fixed, closing issue.

If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
Project Member

Comment 15 by sheriffbot@chromium.org, Jul 31 2016

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify
Project Member

Comment 16 by sheriffbot@chromium.org, Aug 2 2016

Labels: Merge-Request-53

Comment 17 by dimu@chromium.org, Aug 3 2016

Labels: -Merge-Request-53 Merge-Approved-53 Hotlist-Merge-Approved
Your change meets the bar and is auto-approved for M53 (branch: 2785)
Is there anything to merge here? If not, please remove "Merge-Approved-53" label. Thank you.
mbarbella@, interested in your reasoning behind #11
We use the system freetype, so there isn't much we can do here other than get it fixed upstream.
Labels: -Hotlist-Merge-Approved -Merge-Approved-53
Labels: -ClusterFuzz-Verified ClusterFuzz-Wrong
Status: Available (was: Verified)
I don't believe it could get fixed, and we have another reproducer as well.
Project Member

Comment 23 by ClusterFuzz, Aug 24 2016

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5391489058471936

Fuzzer: attekett_surku_fuzzer
Job Type: linux_asan_chrome_media
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 1
Crash Address: 0x6210000434f4
Crash State:
  parse_encoding
  parse_dict
  T1_Face_Init
  
Recommended Security Severity: Medium


Minimized Testcase (24.61 Kb): https://cluster-fuzz.appspot.com/download/AMIfv96AgJ5evUmnVTWKs4OsZqY7rvYiNroajSBEahF5gYkUW2qPx30IWuo9i_1qLYs6QvacIwmxqeBrsZ7ZU1Mw1bDe-hjwkiFmpZ-TAU9bYy9JtQJrlqV0zoR-pVOYFcWnGFh3r_L5iLgF0BqKtJ9ubMTWi25RMwOZdo0WiJlivXhGX38YKow?testcase_id=5391489058471936

Issue manually filed by: mmoroz

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
Project Member

Comment 24 by sheriffbot@chromium.org, Aug 24 2016

Status: Assigned (was: Available)
Labels: -reward-topanel reward-0
I'm sorry to say the panel declined to reward for this bug, since it's highly likely to be unexploitable, and potentially caused by the old version of freetype used for testing.
Project Member

Comment 26 by sheriffbot@chromium.org, Sep 1 2016

Labels: -M-52 M-53
bungeman - can this be closed out?  Thanks.
Status: WontFix (was: Assigned)
I can't reproduce this with:
1) up-to-date system FreeType on Ubuntu 14.04
2) PDFium's bundled FreeType.
 Issue 655951  has been merged into this issue.
Project Member

Comment 31 by sheriffbot@chromium.org, Jan 11 2017

Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 32 by ClusterFuzz, Feb 28 2017

ClusterFuzz has detected this issue as fixed in range 453196:453213.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5391489058471936

Fuzzer: attekett_surku_fuzzer
Job Type: linux_asan_chrome_media
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 1
Crash Address: 0x6210000434f4
Crash State:
  parse_encoding
  parse_dict
  T1_Face_Init
  
Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_media&range=453196:453213

Reproducer Testcase: https://cluster-fuzz.appspot.com/download/AMIfv96AgJ5evUmnVTWKs4OsZqY7rvYiNroajSBEahF5gYkUW2qPx30IWuo9i_1qLYs6QvacIwmxqeBrsZ7ZU1Mw1bDe-hjwkiFmpZ-TAU9bYy9JtQJrlqV0zoR-pVOYFcWnGFh3r_L5iLgF0BqKtJ9ubMTWi25RMwOZdo0WiJlivXhGX38YKow?testcase_id=5391489058471936


See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.

Comment 33 by npm@chromium.org, Feb 28 2017

Cc: bunge...@chromium.org
Owner: drott@chromium.org
Status: Fixed (was: WontFix)
Probably fixed by updating freetype in Chromium.
Labels: -ClusterFuzz-Wrong
We have made a bunch of changes on ClusterFuzz side, so resetting ClusterFuzz-Wrong label.

Sign in to add a comment