Issue metadata
Sign in to add a comment
|
Security: PDFium: Out-Of-Bounds Read in CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback
Reported by
stackexp...@gmail.com,
Jun 2 2016
|
||||||||||||||||||||||
Issue description
Security: PDFium: Out-Of-Bounds Read in CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback
VULNERABILITY DETAILS
This Out-Of-Bounds Read vulnerability was caused by the malformed gif file embedded in the PDF document. More specifically, this issue can be triggered by embedding a malformed gif file in the XFA component.
The latest dev version of chrome (52.0.2743.19 dev-m) was vulnerable to this issue.
---------------------------
Exception Information
---------------------------
(4ff4.20c4): Access violation - code c0000005 (!!! second chance !!!)
eax=000000c7 ebx=000000f9 ecx=09686ff8 edx=000000f9 esi=000000c7 edi=096a4f30
eip=006ff406 esp=0118f8e8 ebp=0118f914 iopl=0 nv up ei pl zr na pe nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246
pdfium_test!CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback+0x156:
006ff406 8b1c99 mov ebx,dword ptr [ecx+ebx*4] ds:002b:096873dc=????????
---------------------------
Heap Information
---------------------------
0:000> !heap -p -a ecx
address 09686ff8 found in
_DPH_HEAP_ROOT @ 4991000
in busy allocation ( DPH_HEAP_BLOCK: UserAddr UserSize - VirtAddr VirtSize)
a1738f0: 9686ff8 1 - 9686000 2000
61a48e89 verifier!AVrfDebugPageHeapAllocate+0x00000229
77621d4e ntdll!RtlDebugAllocateHeap+0x00000030
775db586 ntdll!RtlpAllocateHeap+0x000000c4
77583541 ntdll!RtlAllocateHeap+0x0000023a
006aded4 pdfium_test!_calloc_base+0x00000047 [d:\th\minkernel\crts\ucrt\src\appcrt\heap\calloc_base.cpp @ 33]
006ff309 pdfium_test!CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback+0x00000059 [core\fxcodec\codec\fx_codec_progress.cpp @ 642]
00701c81 pdfium_test!gif_get_record_position+0x00000051 [core\fxcodec\codec\fx_codec_gif.cpp @ 67]
00705548 pdfium_test!gif_load_frame+0x00000148 [core\fxcodec\lgif\fx_gif.cpp @ 862]
00701965 pdfium_test!CCodec_GifModule::LoadFrame+0x00000035 [core\fxcodec\codec\fx_codec_gif.cpp @ 146]
006fded9 pdfium_test!CCodec_ProgressiveDecoder::ContinueDecode+0x00000219 [core\fxcodec\codec\fx_codec_progress.cpp @ 2119]
005a1b22 pdfium_test!XFA_LoadImageFromBuffer+0x000001b2 [xfa\fxfa\app\xfa_ffwidget.cpp @ 1107]
005a1927 pdfium_test!XFA_LoadImageData+0x00000277 [xfa\fxfa\app\xfa_ffwidget.cpp @ 1032]
0059514b pdfium_test!CXFA_ImageLayoutData::LoadImageData+0x0000006b [xfa\fxfa\app\xfa_ffwidgetacc.cpp @ 96]
005951b1 pdfium_test!CXFA_WidgetAcc::LoadImageImage+0x00000011 [xfa\fxfa\app\xfa_ffwidgetacc.cpp @ 1002]
0058cfa8 pdfium_test!CXFA_FFPageWidgetIterator::MoveToNext+0x00000018 [xfa\fxfa\app\xfa_ffpageview.cpp @ 166]
003696b7 pdfium_test!CPDFSDK_Document::GetPageView+0x00000087 [fpdfsdk\fsdk_mgr.cpp @ 268]
0035e73e pdfium_test!FORM_OnAfterLoadPage+0x0000002e [fpdfsdk\fpdfformfill.cpp @ 642]
00355517 pdfium_test!RenderPage+0x00000047 [samples\pdfium_test.cc @ 498]
00355b02 pdfium_test!RenderPdf+0x00000302 [samples\pdfium_test.cc @ 694]
0035bb1e pdfium_test!main+0x0000042e [samples\pdfium_test.cc @ 836]
006905d6 pdfium_test!__scrt_common_main_seh+0x000000ff [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 264]
7528338a kernel32!BaseThreadInitThunk+0x0000000e
77589a02 ntdll!__RtlUserThreadStart+0x00000070
775899d5 ntdll!_RtlUserThreadStart+0x0000001b
---------------------------
Source Code Information
---------------------------
The OOB access range can be 0x3e4.
int startX = pCodec->m_startX;
int startY = pCodec->m_startY;
int sizeX = pCodec->m_sizeX;
int sizeY = pCodec->m_sizeY;
int Bpp = pDevice->GetBPP() / 8;
FX_ARGB argb = pCodec->m_pSrcPalette[pal_index]; // <--------- CRASHED!!!
0:000> dv
pModule = 0x096a4f30
rcd_pos = <value unavailable>
img_rc = 0x0118f94c
pal_num = 0n0
pal_ptr = 0x00000000
delay_time = 0n0
user_input = 0n0
trans_index = 0n-1
disposal_method = 0n0
interlace = 0n0
error_status = 0n157962032 (No matching enumerant)
Bpp = <value unavailable>
pPalette = <value unavailable>
pal_index = 0n249 <----------------------------- pal_index = 249
startY = 0n0
sizeX = 0n199
argb = <value unavailable>
pDevice = 0x0a1c7fd8
sizeY = 0n199
i = <value unavailable>
row = <value unavailable>
pScanline = <value unavailable>
0:000> r ebx
ebx=000000f9
0:000> ?ebx*4
Evaluate expression: 996 = 000003e4
---------------------------
Stacktrace Information
---------------------------
0:000> k
ChildEBP RetAddr
0118f914 00701c81 pdfium_test!CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback+0x156 [core\fxcodec\codec\fx_codec_progress.cpp @ 674]
0118f95c 00705548 pdfium_test!gif_get_record_position+0x51 [core\fxcodec\codec\fx_codec_gif.cpp @ 67]
0118f9b4 00701965 pdfium_test!gif_load_frame+0x148 [core\fxcodec\lgif\fx_gif.cpp @ 862]
0118f9d8 006fded9 pdfium_test!CCodec_GifModule::LoadFrame+0x35 [core\fxcodec\codec\fx_codec_gif.cpp @ 146]
0118fa1c 005a1b22 pdfium_test!CCodec_ProgressiveDecoder::ContinueDecode+0x219 [core\fxcodec\codec\fx_codec_progress.cpp @ 2119]
0118fa84 005a1927 pdfium_test!XFA_LoadImageFromBuffer+0x1b2 [xfa\fxfa\app\xfa_ffwidget.cpp @ 1107]
0118fadc 0059514b pdfium_test!XFA_LoadImageData+0x277 [xfa\fxfa\app\xfa_ffwidget.cpp @ 1032]
0118fb10 005951b1 pdfium_test!CXFA_ImageLayoutData::LoadImageData+0x6b [xfa\fxfa\app\xfa_ffwidgetacc.cpp @ 96]
0118fb1c 0061a488 pdfium_test!CXFA_WidgetAcc::LoadImageImage+0x11 [xfa\fxfa\app\xfa_ffwidgetacc.cpp @ 1002]
0118fb24 0058cd83 pdfium_test!CXFA_FFImage::LoadWidget+0x28 [xfa\fxfa\app\xfa_ffimage.cpp @ 28]
0118fb38 0058cfa8 pdfium_test!CXFA_FFPageWidgetIterator::GetWidget+0x83 [xfa\fxfa\app\xfa_ffpageview.cpp @ 198]
0118fb48 00369f4d pdfium_test!CXFA_FFPageWidgetIterator::MoveToNext+0x18 [xfa\fxfa\app\xfa_ffpageview.cpp @ 166]
0118fb78 003696b7 pdfium_test!CPDFSDK_PageView::LoadFXAnnots+0x8d [fpdfsdk\fsdk_mgr.cpp @ 921]
0118fb8c 0035e73e pdfium_test!CPDFSDK_Document::GetPageView+0x87 [fpdfsdk\fsdk_mgr.cpp @ 268]
(Inline) -------- pdfium_test!?A0x06ce08b4::FormHandleToPageView+0x2a [fpdfsdk\fpdfformfill.cpp @ 45]
0118fba0 00355517 pdfium_test!FORM_OnAfterLoadPage+0x2e [fpdfsdk\fpdfformfill.cpp @ 642]
0118fc94 00355b02 pdfium_test!RenderPage+0x47 [samples\pdfium_test.cc @ 498]
0118fdb0 0035bb1e pdfium_test!RenderPdf+0x302 [samples\pdfium_test.cc @ 694]
0118feec 006905d6 pdfium_test!main+0x42e [samples\pdfium_test.cc @ 836]
(Inline) -------- pdfium_test!invoke_main+0x1d [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 74]
0118ff38 7528338a pdfium_test!__scrt_common_main_seh+0xff [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 264]
0118ff44 77589a02 kernel32!BaseThreadInitThunk+0xe
0118ff84 775899d5 ntdll!__RtlUserThreadStart+0x70
0118ff9c 00000000 ntdll!_RtlUserThreadStart+0x1b
---------------------------
PoC Diff
---------------------------
I've already did some difference reduction work. To trigger the vulnerability, nine bytes in the original seed gif image were deleted. The bytes begins at file offset 0x0A and they were presented as follows.
80 00 00 00 00 FF FF 00 00
After this mutation, the LogicalScreenDescriptor and the GlobalColorTable structs of the gif image was corrupted.
VERSION
Chrome Version: [52.0.2743.19] + [dev]
Operating System: [Windows 7 SP1]
REPRODUCTION CASE
Both the original normal gif file, the malformed gif file, and the proof-of-concept PDF file were attached.
FOR CRASHES, PLEASE INCLUDE THE FOLLOWING ADDITIONAL INFORMATION
Type of crash: [tab]
,
Jun 2 2016
ClusterFuzz is analyzing your testcase. Developers can follow the progress at https://cluster-fuzz.appspot.com/testcase?key=5223049339338752
,
Jun 2 2016
,
Jun 3 2016
tsepez, PTAL?
,
Jun 3 2016
,
Jun 3 2016
,
Jun 3 2016
Punting all of these to ochang.
,
Jun 3 2016
hong_zhang, could you please route this security bug to the appropriate person? thanks.
,
Jun 4 2016
This issue is a security regression. If you are not able to fix this quickly, please revert the change that introduced it. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Jun 4 2016
,
Jun 8 2016
Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5223049339338752 Uploader: felt@google.com Job Type: linux_asan_pdfium Platform Id: linux Crash Type: Heap-buffer-overflow READ 4 Crash Address: 0x6090000019c4 Crash State: CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback gif_get_record_position gif_load_frame Recommended Security Severity: Medium Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_pdfium&range=393856:393893 Minimized Testcase (5.70 Kb): https://cluster-fuzz.appspot.com/download/AMIfv97Y14a_YzjHUmkkfzQMzhZ6V8ZDyAphc5kngAjMnewC8L-Z30nctYDm1pvibbEH38YX5uvP4reXQgblYHdBktnS_g_-6No_ro31o_aykiAL-P04Vz_2598twxFjhODhgTUoiJAylYZKZSj_TD-IVEgzCmjiDg See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
Jun 10 2016
Issue 618292 has been merged into this issue.
,
Jun 10 2016
Issue 618297 has been merged into this issue.
,
Jun 10 2016
ClusterFuzz has detected this issue as fixed in range 399086:399117. Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5223049339338752 Uploader: felt@google.com Job Type: linux_asan_pdfium Platform Id: linux Crash Type: Heap-buffer-overflow READ 4 Crash Address: 0x6090000019c4 Crash State: CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback gif_get_record_position gif_load_frame Recommended Security Severity: Medium Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_pdfium&range=393856:393893 Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_pdfium&range=399086:399117 Minimized Testcase (5.70 Kb): https://cluster-fuzz.appspot.com/download/AMIfv97Y14a_YzjHUmkkfzQMzhZ6V8ZDyAphc5kngAjMnewC8L-Z30nctYDm1pvibbEH38YX5uvP4reXQgblYHdBktnS_g_-6No_ro31o_aykiAL-P04Vz_2598twxFjhODhgTUoiJAylYZKZSj_TD-IVEgzCmjiDg See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Jun 10 2016
ClusterFuzz has detected this issue as fixed in range 399086:399117. Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5223049339338752 Uploader: felt@google.com Job Type: linux_asan_pdfium Platform Id: linux Crash Type: Heap-buffer-overflow READ 4 Crash Address: 0x6090000019c4 Crash State: CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback gif_get_record_position gif_load_frame Recommended Security Severity: Medium Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_pdfium&range=393856:393893 Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_pdfium&range=399086:399117 Minimized Testcase (5.70 Kb): https://cluster-fuzz.appspot.com/download/AMIfv97Y14a_YzjHUmkkfzQMzhZ6V8ZDyAphc5kngAjMnewC8L-Z30nctYDm1pvibbEH38YX5uvP4reXQgblYHdBktnS_g_-6No_ro31o_aykiAL-P04Vz_2598twxFjhODhgTUoiJAylYZKZSj_TD-IVEgzCmjiDg See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Jun 13 2016
,
Jun 14 2016
ClusterFuzz testcase is verified as fixed, closing issue. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
Jun 14 2016
,
Jun 14 2016
Sorry for the incorrect ClusterFuzz update, please ignore it. Reopening bug.
,
Jun 15 2016
[Bulk edit] Per inferno@, Security_Impact=None bugs should not be release blockers.
,
Jun 15 2016
,
Jun 16 2016
Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6158989385793536 Fuzzer: pdf_codec_png_fuzzer Job Type: libfuzzer_chrome_asan Platform Id: linux Crash Type: Heap-buffer-overflow READ 4 Crash Address: 0x60300000e858 Crash State: CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback gif_get_record_position gif_load_frame Recommended Security Severity: Medium Regressed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=398287:398366 Minimized Testcase (3.02 Kb): https://cluster-fuzz.appspot.com/download/AMIfv95KDrVFHh2iYu0toQg5x3yjnBVMMm2aNuUYGGyoHh5fDEOzrMGkMvMEGIRbpvmICXdODzxDm9hYCO-Iut9rws9nM8QQ1lVZ5Os1mXHNim13fMT0AEFxAJj6yxCXtoMAKEAEOVfVWSLaUuX4NkSySeXJQYvmbA Filer: mmoroz See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.
,
Jun 16 2016
XFA has been disabled as we fix some issues, blocking the XFA bug on this one and changing the priority.
,
Jun 16 2016
,
Jun 17 2016
ClusterFuzz has detected this issue as fixed in range 400121:400191. Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6158989385793536 Fuzzer: pdf_codec_png_fuzzer Job Type: libfuzzer_chrome_asan Platform Id: linux Crash Type: Heap-buffer-overflow READ 4 Crash Address: 0x60300000e858 Crash State: CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback gif_get_record_position gif_load_frame Recommended Security Severity: Medium Regressed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=398287:398366 Fixed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=400121:400191 Minimized Testcase (3.02 Kb): https://cluster-fuzz.appspot.com/download/AMIfv95KDrVFHh2iYu0toQg5x3yjnBVMMm2aNuUYGGyoHh5fDEOzrMGkMvMEGIRbpvmICXdODzxDm9hYCO-Iut9rws9nM8QQ1lVZ5Os1mXHNim13fMT0AEFxAJj6yxCXtoMAKEAEOVfVWSLaUuX4NkSySeXJQYvmbA See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Jun 22 2016
Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5035050550951936 Fuzzer: pdf_codec_gif_fuzzer Job Type: libfuzzer_chrome_asan Platform Id: linux Crash Type: Heap-buffer-overflow READ 4 Crash Address: 0x60400000df3c Crash State: CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback gif_get_record_position gif_load_frame Recommended Security Severity: Medium Regressed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=400757:400887 Minimized Testcase (0.25 Kb): https://cluster-fuzz.appspot.com/download/AMIfv94DI0Q40fBvlfuQ8KgkYGk52KymgTp_bRFB8UvfQreaCTsY0s2EIgippva9TjSz9AfwYEGDPS5LQmpix3acgqbmNrY10UNEf2nROkfmOl8WV4WC8S0_A9Z9Pw3LTbDc1xsKoGvm7SwSfmEoKYD3P-_um2QvGQ?testcase_id=5035050550951936 Filer: mmoroz See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.
,
Aug 31 2016
Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5220208373661696 Fuzzer: afl_pdf_codec_gif_fuzzer Job Type: afl_chrome_asan Platform Id: linux Crash Type: Heap-buffer-overflow READ 4 Crash Address: 0x60200000ee70 Crash State: CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback gif_get_record_position gif_load_frame Recommended Security Severity: Low Regressed: https://cluster-fuzz.appspot.com/revisions?job=afl_chrome_asan&range=402185:402404 Minimized Testcase (0.07 Kb): https://cluster-fuzz.appspot.com/download/AMIfv97BVjpFJDV8vta46iyvR_-Jf_uE6j6is16r62Ai_n_IaKPk7GWT1-wf4YeHzMgMtxs_uRkc9MN8Z_TxfUCmDFLcVWWpy6LrLKmryCeRiWr2xkPj1zZQazjbmIZgxeHGFBG-otNpbkbsAWRmUhVCIolrTxgybQ?testcase_id=5220208373661696 Additional requirements: Requires Gestures See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.
,
Sep 1 2016
Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6671508598685696 Fuzzer: afl_pdf_codec_gif_fuzzer Job Type: afl_chrome_asan Platform Id: linux Crash Type: Heap-use-after-free READ 4 Crash Address: 0x60400000df24 Crash State: CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback gif_get_record_position gif_load_frame Recommended Security Severity: High Regressed: https://cluster-fuzz.appspot.com/revisions?job=afl_chrome_asan&range=402185:402404 Minimized Testcase (0.11 Kb): https://cluster-fuzz.appspot.com/download/AMIfv960SQTzIMz5zhPTwDX3hGq6foKL3jESwfm2L5tvT34hYPwOFu5Sk19OaQHC8E6hrz7Ir6S7YL8r2b0-RcPbTqoYkBAwuQ9WXTFHv-rCkIqFw5Y8GmTc0UvMgjUO47LAvcRaaa5nfhnixDXPf2ZJNW3ZsttHCg?testcase_id=6671508598685696 See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.
,
Oct 8 2016
Kindly reminder: this issue is still reproducible.
,
Oct 14 2016
,
Jan 17 2017
ClusterFuzz has detected this issue as fixed in range 443949:443963. Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6671508598685696 Fuzzer: afl_pdf_codec_gif_fuzzer Job Type: afl_chrome_asan Platform Id: linux Crash Type: Heap-use-after-free READ 4 Crash Address: 0x60400000df24 Crash State: CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback gif_get_record_position gif_load_frame Sanitizer: address (ASAN) Recommended Security Severity: High Regressed: https://cluster-fuzz.appspot.com/revisions?job=afl_chrome_asan&range=402185:402404 Fixed: https://cluster-fuzz.appspot.com/revisions?job=afl_chrome_asan&range=443949:443963 Minimized Testcase (0.11 Kb): https://cluster-fuzz.appspot.com/download/AMIfv960SQTzIMz5zhPTwDX3hGq6foKL3jESwfm2L5tvT34hYPwOFu5Sk19OaQHC8E6hrz7Ir6S7YL8r2b0-RcPbTqoYkBAwuQ9WXTFHv-rCkIqFw5Y8GmTc0UvMgjUO47LAvcRaaa5nfhnixDXPf2ZJNW3ZsttHCg?testcase_id=6671508598685696 See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Jan 18 2017
ClusterFuzz has detected this issue as fixed in range 443963:443986. Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5220208373661696 Fuzzer: afl_pdf_codec_gif_fuzzer Job Type: afl_chrome_asan Platform Id: linux Crash Type: Heap-buffer-overflow READ 4 Crash Address: 0x60200000ee70 Crash State: CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback gif_get_record_position gif_load_frame Sanitizer: address (ASAN) Recommended Security Severity: Low Regressed: https://cluster-fuzz.appspot.com/revisions?job=afl_chrome_asan&range=402185:402404 Fixed: https://cluster-fuzz.appspot.com/revisions?job=afl_chrome_asan&range=443963:443986 Minimized Testcase (0.07 Kb): https://cluster-fuzz.appspot.com/download/AMIfv97BVjpFJDV8vta46iyvR_-Jf_uE6j6is16r62Ai_n_IaKPk7GWT1-wf4YeHzMgMtxs_uRkc9MN8Z_TxfUCmDFLcVWWpy6LrLKmryCeRiWr2xkPj1zZQazjbmIZgxeHGFBG-otNpbkbsAWRmUhVCIolrTxgybQ?testcase_id=5220208373661696 Additional requirements: Requires Gestures See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Feb 15 2017
ClusterFuzz has detected this issue as fixed in range 450434:450482. Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5035050550951936 Fuzzer: pdf_codec_gif_fuzzer Job Type: libfuzzer_chrome_asan Platform Id: linux Crash Type: Heap-buffer-overflow READ 4 Crash Address: 0x60400000df3c Crash State: CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback gif_get_record_position gif_load_frame Sanitizer: address (ASAN) Recommended Security Severity: Medium Regressed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=400757:400887 Fixed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=450434:450482 Reproducer Testcase: https://cluster-fuzz.appspot.com/download/AMIfv95y7r51UjpPYgbMY-DlVj9poFzrL8ZOv9ex8WgBKhXCOdEo8Y5O3tdZ-9SlViJV0y5XuFivNJ3KY4jD8RKAFokIHhuAvvVJlsjEJAvFNJMOFpt4UtM22h2stwa_HyeHQ5j9YfRqZ0Xww5Kc1WDX4qpu8df-1f8Iol-w_QfVciSwFGsdF_4Wb8FcK6scHrgQgQ8Yxo3ovkSsA8RMlezMZn-AFCIcvknm2wYJgxIAiadrYpA_2hJLDo1xeRT2pPiVpu1PTUUQ9voOTHQxHcKHgmHSuWkTC5bfkbiOHolpdqYld1oq4JuRrS77y7WdWMYH5BApcuO0pMJrK91rhcX-7YUBtLkO7D8Kg0UHH9-rzzv6H7eEdM0?testcase_id=5035050550951936 See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Mar 16 2017
,
Aug 29 2017
,
Oct 24 2017
For more information, please see https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reference.md. The link referenced in the description is no longer valid. (bulk edit)
,
Jan 29 2018
,
Jan 29 2018
Confirmed this no long reproduces
,
May 8 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by stackexp...@gmail.com
, Jun 2 2016