Issue metadata
Sign in to add a comment
|
Heap-buffer-overflow in ps_table_add |
||||||||||||||||||||||
Issue descriptionDetailed report: https://cluster-fuzz.appspot.com/testcase?key=4548226098659328 Fuzzer: attekett_surku_fuzzer Job Type: linux_asan_chrome_media Platform Id: linux Crash Type: Heap-buffer-overflow READ 7 Crash Address: 0x61b000014f90 Crash State: ps_table_add parse_encoding parse_dict Recommended Security Severity: Medium Minimized Testcase (85.95 Kb): https://cluster-fuzz.appspot.com/download/AMIfv974Qq4DJnQhgEru8jsM7evXOlzFUSJOmzjhxQuOddFVxEazhqmQk4PFiclviwuSiKl9VInpYUmOr2wRo59_dfPQa0qPgdKkfURYxtyYmToQLSl689-xHbWenDQf1Qs3SYVQg36x3SrzrfJzRgrbvpgB216t_VtHnlngozPLVcKe0ChCz88 Filer: mmoroz See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
May 10 2016
Setting PDFium component + adding ochang@ as an expert in pdfium stuff.
,
May 10 2016
,
May 10 2016
,
May 10 2016
My understanding is that freetype is only shipped for Android (freetype-android). For other platforms, e.g. Linux, it is only used for testing and development, and never shipped in a production build (we link with system freetype). Setting Impact to None.
,
May 10 2016
I agree. But why cannot we update freetype? Does an update require many resources to be done? Or, asking this in another way: what is the reason to have _very_ old version of a library with a huge number of known vulnerabilities in the repo? My position is: A) if it isn't used at all, it should be removed B) if it is used somewhere (tests, for example), it should be updated May be I'm wrong. What do you think?
,
May 10 2016
For for pdfium at least, updating our bundled freetype (which is only used for testing/fuzzing) is a tedious task because it breaks our pixel tests due to slight font rendering differences. I would assume that updating third_party/freetype2 has similar issues for other tests, and the effort required isn't worth the minor gains it has given that it is never shipped to actual users.
,
May 10 2016
(I could be wrong -- bungeman probably has a better answer to this).
,
May 24 2016
,
May 27 2016
Discussed this offline. I'm going to mark this as Stable impacting rather than None. ExternalDependency is more appropriate.
,
Jul 13 2016
Detailed report: https://cluster-fuzz.appspot.com/testcase?key=4519118002978816 Fuzzer: attekett_surku_fuzzer Job Type: linux_asan_chrome_mp Platform Id: linux Crash Type: Heap-buffer-overflow READ 13 Crash Address: 0x619000002714 Crash State: ps_table_add parse_encoding parse_dict Recommended Security Severity: Medium Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=314095:314100 Minimized Testcase (59.11 Kb): https://cluster-fuzz.appspot.com/download/AMIfv95JMpq0mL4_28rcvrBpsp2Y8b8tY_BW7ZDcuRvTOw5oRc0vMN1ttDu192ga9ImneQX0cn5EJn_gdoqsnuV48BshEmxGYLr8XTq8hp4SjgCeEPsp3hA93enNYmMv9ZPKeeuZtw1cIkeKidiIgHxNXDVztyi_gkDVUpJCV-1bRnGQ_K5IymQ?testcase_id=4519118002978816 Filer: mmoroz See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
Jul 21 2016
,
Jul 31 2016
ClusterFuzz has detected this issue as fixed in range 408642:408661. Detailed report: https://cluster-fuzz.appspot.com/testcase?key=4548226098659328 Fuzzer: attekett_surku_fuzzer Job Type: linux_asan_chrome_media Platform Id: linux Crash Type: Heap-buffer-overflow READ 7 Crash Address: 0x61b000014f90 Crash State: ps_table_add parse_encoding parse_dict Recommended Security Severity: Medium Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_media&range=408642:408661 Minimized Testcase (85.95 Kb): https://cluster-fuzz.appspot.com/download/AMIfv94ySAYpjdXuytNTIWfvSupaihS8QFhuZUEtf9yqoFH7ONGGD9bHgR1JDv5c_oZeIAiKrvK07wHF8yiSQ2LjG2jw-4Gw3nZydCWPcJ3mCBV_o2KlCPjLY8SSSALh_OX7F4fHhUHq3tOkidCD0y4PnvHaKYNFBs1fLZn4METfvv9OTeqK3kc?testcase_id=4548226098659328 See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Jul 31 2016
ClusterFuzz has detected this issue as fixed in range 408633:408661. Detailed report: https://cluster-fuzz.appspot.com/testcase?key=4519118002978816 Fuzzer: attekett_surku_fuzzer Job Type: linux_asan_chrome_mp Platform Id: linux Crash Type: Heap-buffer-overflow READ 13 Crash Address: 0x619000002714 Crash State: ps_table_add parse_encoding parse_dict Recommended Security Severity: Medium Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=314095:314100 Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=408633:408661 Minimized Testcase (59.11 Kb): https://cluster-fuzz.appspot.com/download/AMIfv95JMpq0mL4_28rcvrBpsp2Y8b8tY_BW7ZDcuRvTOw5oRc0vMN1ttDu192ga9ImneQX0cn5EJn_gdoqsnuV48BshEmxGYLr8XTq8hp4SjgCeEPsp3hA93enNYmMv9ZPKeeuZtw1cIkeKidiIgHxNXDVztyi_gkDVUpJCV-1bRnGQ_K5IymQ?testcase_id=4519118002978816 See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Jul 31 2016
ClusterFuzz testcase is verified as fixed, closing issue. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
Jul 31 2016
,
Aug 2 2016
,
Aug 3 2016
Your change meets the bar and is auto-approved for M53 (branch: 2785)
,
Aug 4 2016
Is there anything to merge here? If not, please remove "Merge-Approved-53" label. Thank you.
,
Aug 6 2016
This issue has been approved for a merge. Please merge the fix to any appropriate branches as soon as possible! If all merges have been completed, please remove any remaining Merge-Approved labels from this issue. Thanks for your time! To disable nags, add the Disable-Nags label. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Aug 8 2016
No, there's nothing to merge. I don't even know why this is an issue considering third_party/freetype2 isn't actually shipped.
,
Aug 8 2016
Removing "Merge-Approved-53"label per comment #21. Thank you.
,
Aug 10 2016
,
Aug 24 2016
,
Aug 26 2016
Thanks as ever - $1,500 for this one.
,
Aug 26 2016
,
Aug 26 2016
,
Nov 6 2016
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by mmoroz@chromium.org
, May 10 2016Owner: bunge...@chromium.org