New issue
Advanced search Search tips

Issue 610644 link

Starred by 1 user

Issue metadata

Status: Verified
Owner:
Closed: Jul 2016
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 1
Type: Bug-Security

Blocked on:
issue 594972



Sign in to add a comment

Heap-buffer-overflow in ps_table_add

Project Member Reported by ClusterFuzz, May 10 2016

Issue description

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=4548226098659328

Fuzzer: attekett_surku_fuzzer
Job Type: linux_asan_chrome_media
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 7
Crash Address: 0x61b000014f90
Crash State:
  ps_table_add
  parse_encoding
  parse_dict
  
Recommended Security Severity: Medium


Minimized Testcase (85.95 Kb): https://cluster-fuzz.appspot.com/download/AMIfv974Qq4DJnQhgEru8jsM7evXOlzFUSJOmzjhxQuOddFVxEazhqmQk4PFiclviwuSiKl9VInpYUmOr2wRo59_dfPQa0qPgdKkfURYxtyYmToQLSl689-xHbWenDQf1Qs3SYVQg36x3SrzrfJzRgrbvpgB216t_VtHnlngozPLVcKe0ChCz88

Filer: mmoroz

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
 

Comment 1 by mmoroz@chromium.org, May 10 2016

Cc: mmoroz@chromium.org kcc@chromium.org
Owner: bunge...@chromium.org
bungeman@, could we please update freetype?

Last time when we've discussed that we had a conclusion that it is not used in the Chromium (https://codereview.chromium.org/1776323002/).

But if I understand the crash correctly, it can be reached through pdfium and definitely worth to be updated.

Comment 2 by mmoroz@chromium.org, May 10 2016

Cc: och...@chromium.org
Components: Internals>Plugins>PDF
Labels: Pri-1
Setting PDFium component + adding ochang@ as an expert in pdfium stuff.

Comment 3 by mmoroz@chromium.org, May 10 2016

Labels: M-51
Project Member

Comment 4 by ClusterFuzz, May 10 2016

Status: Assigned (was: Available)

Comment 5 by och...@chromium.org, May 10 2016

Labels: -Security_Impact-Stable Security_Impact-None
My understanding is that freetype is only shipped for Android (freetype-android). For other platforms, e.g. Linux, it is only used for testing and development, and never shipped in a production build (we link with system freetype).

Setting Impact to None.

Comment 6 by mmoroz@chromium.org, May 10 2016

I agree. But why cannot we update freetype? Does an update require many resources to be done?

Or, asking this in another way: what is the reason to have _very_ old version of a library with a huge number of known vulnerabilities in the repo?

My position is:
A) if it isn't used at all, it should be removed
B) if it is used somewhere (tests, for example), it should be updated

May be I'm wrong. What do you think?

Comment 7 by och...@chromium.org, May 10 2016

For for pdfium at least, updating our bundled freetype (which is only used for testing/fuzzing) is a tedious task because it breaks our pixel tests due to slight font rendering differences.

I would assume that updating third_party/freetype2 has similar issues for other tests, and the effort required isn't worth the minor gains it has given that it is never shipped to actual users.

Comment 8 by och...@chromium.org, May 10 2016

(I could be wrong -- bungeman probably has a better answer to this).

Comment 9 by mmoroz@chromium.org, May 24 2016

Blockedon: 594972
Labels: -Security_Impact-None Security_Impact-Stable
Status: ExternalDependency (was: Assigned)
Discussed this offline. I'm going to mark this as Stable impacting rather than None. ExternalDependency is more appropriate.
Project Member

Comment 11 by ClusterFuzz, Jul 13 2016

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=4519118002978816

Fuzzer: attekett_surku_fuzzer
Job Type: linux_asan_chrome_mp
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 13
Crash Address: 0x619000002714
Crash State:
  ps_table_add
  parse_encoding
  parse_dict
  
Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=314095:314100

Minimized Testcase (59.11 Kb): https://cluster-fuzz.appspot.com/download/AMIfv95JMpq0mL4_28rcvrBpsp2Y8b8tY_BW7ZDcuRvTOw5oRc0vMN1ttDu192ga9ImneQX0cn5EJn_gdoqsnuV48BshEmxGYLr8XTq8hp4SjgCeEPsp3hA93enNYmMv9ZPKeeuZtw1cIkeKidiIgHxNXDVztyi_gkDVUpJCV-1bRnGQ_K5IymQ?testcase_id=4519118002978816

Filer: mmoroz

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
Project Member

Comment 12 by sheriffbot@chromium.org, Jul 21 2016

Labels: -M-51 M-52
Project Member

Comment 13 by ClusterFuzz, Jul 31 2016

ClusterFuzz has detected this issue as fixed in range 408642:408661.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=4548226098659328

Fuzzer: attekett_surku_fuzzer
Job Type: linux_asan_chrome_media
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 7
Crash Address: 0x61b000014f90
Crash State:
  ps_table_add
  parse_encoding
  parse_dict
  
Recommended Security Severity: Medium

Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_media&range=408642:408661

Minimized Testcase (85.95 Kb): https://cluster-fuzz.appspot.com/download/AMIfv94ySAYpjdXuytNTIWfvSupaihS8QFhuZUEtf9yqoFH7ONGGD9bHgR1JDv5c_oZeIAiKrvK07wHF8yiSQ2LjG2jw-4Gw3nZydCWPcJ3mCBV_o2KlCPjLY8SSSALh_OX7F4fHhUHq3tOkidCD0y4PnvHaKYNFBs1fLZn4METfvv9OTeqK3kc?testcase_id=4548226098659328

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 14 by ClusterFuzz, Jul 31 2016

ClusterFuzz has detected this issue as fixed in range 408633:408661.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=4519118002978816

Fuzzer: attekett_surku_fuzzer
Job Type: linux_asan_chrome_mp
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 13
Crash Address: 0x619000002714
Crash State:
  ps_table_add
  parse_encoding
  parse_dict
  
Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=314095:314100
Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=408633:408661

Minimized Testcase (59.11 Kb): https://cluster-fuzz.appspot.com/download/AMIfv95JMpq0mL4_28rcvrBpsp2Y8b8tY_BW7ZDcuRvTOw5oRc0vMN1ttDu192ga9ImneQX0cn5EJn_gdoqsnuV48BshEmxGYLr8XTq8hp4SjgCeEPsp3hA93enNYmMv9ZPKeeuZtw1cIkeKidiIgHxNXDVztyi_gkDVUpJCV-1bRnGQ_K5IymQ?testcase_id=4519118002978816

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 15 by ClusterFuzz, Jul 31 2016

Labels: ClusterFuzz-Verified
Status: Verified (was: ExternalDependency)
ClusterFuzz testcase is verified as fixed, closing issue.

If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
Project Member

Comment 16 by sheriffbot@chromium.org, Jul 31 2016

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify
Project Member

Comment 17 by sheriffbot@chromium.org, Aug 2 2016

Labels: Merge-Request-53

Comment 18 by dimu@chromium.org, Aug 3 2016

Labels: -Merge-Request-53 Merge-Approved-53 Hotlist-Merge-Approved
Your change meets the bar and is auto-approved for M53 (branch: 2785)
Is there anything to merge here? If not, please remove "Merge-Approved-53" label. Thank you.
Project Member

Comment 20 by sheriffbot@chromium.org, Aug 6 2016

This issue has been approved for a merge. Please merge the fix to any appropriate branches as soon as possible!

If all merges have been completed, please remove any remaining Merge-Approved labels from this issue.

Thanks for your time! To disable nags, add the Disable-Nags label.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
No, there's nothing to merge. I don't even know why this is an issue considering third_party/freetype2 isn't actually shipped.
Labels: -Merge-Approved-53
Removing "Merge-Approved-53"label per comment #21. Thank you.
Labels: -Hotlist-Merge-Approved
Labels: -reward-topanel reward-unpaid reward-1500

Comment 25 Deleted

Thanks as ever - $1,500 for this one.
Labels: -attekett_at_gmail.com reward_to-attekett_at_gmail.com
Labels: -reward-unpaid reward-inprocess
Project Member

Comment 29 by sheriffbot@chromium.org, Nov 6 2016

Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment