New issue
Advanced search Search tips

Issue 616672 link

Starred by 2 users

Issue metadata

Status: Fixed
Owner:
Closed: Jan 2018
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 2
Type: Bug-Security

Blocking:
issue 62400
issue 656204



Sign in to add a comment

Security: PDFium: Out-Of-Bounds Read in CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback

Reported by stackexp...@gmail.com, Jun 2 2016

Issue description

Security: PDFium: Out-Of-Bounds Read in CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback

VULNERABILITY DETAILS
This Out-Of-Bounds Read vulnerability was caused by the malformed gif file embedded in the PDF document. More specifically, this issue can be triggered by embedding a malformed gif file in the XFA component.

The latest dev version of chrome (52.0.2743.19 dev-m) was vulnerable to this issue.

---------------------------
Exception Information
---------------------------
(4ff4.20c4): Access violation - code c0000005 (!!! second chance !!!)
eax=000000c7 ebx=000000f9 ecx=09686ff8 edx=000000f9 esi=000000c7 edi=096a4f30
eip=006ff406 esp=0118f8e8 ebp=0118f914 iopl=0         nv up ei pl zr na pe nc
cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
pdfium_test!CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback+0x156:
006ff406 8b1c99        mov ebx,dword ptr [ecx+ebx*4] ds:002b:096873dc=????????

---------------------------
Heap Information
---------------------------
0:000> !heap -p -a ecx
    address 09686ff8 found in
    _DPH_HEAP_ROOT @ 4991000
    in busy allocation (  DPH_HEAP_BLOCK: UserAddr  UserSize - VirtAddr  VirtSize)
                                 a1738f0:  9686ff8         1 -  9686000      2000
    61a48e89 verifier!AVrfDebugPageHeapAllocate+0x00000229
    77621d4e ntdll!RtlDebugAllocateHeap+0x00000030
    775db586 ntdll!RtlpAllocateHeap+0x000000c4
    77583541 ntdll!RtlAllocateHeap+0x0000023a
    006aded4 pdfium_test!_calloc_base+0x00000047 [d:\th\minkernel\crts\ucrt\src\appcrt\heap\calloc_base.cpp @ 33]
    006ff309 pdfium_test!CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback+0x00000059 [core\fxcodec\codec\fx_codec_progress.cpp @ 642]
    00701c81 pdfium_test!gif_get_record_position+0x00000051 [core\fxcodec\codec\fx_codec_gif.cpp @ 67]
    00705548 pdfium_test!gif_load_frame+0x00000148 [core\fxcodec\lgif\fx_gif.cpp @ 862]
    00701965 pdfium_test!CCodec_GifModule::LoadFrame+0x00000035 [core\fxcodec\codec\fx_codec_gif.cpp @ 146]
    006fded9 pdfium_test!CCodec_ProgressiveDecoder::ContinueDecode+0x00000219 [core\fxcodec\codec\fx_codec_progress.cpp @ 2119]
    005a1b22 pdfium_test!XFA_LoadImageFromBuffer+0x000001b2 [xfa\fxfa\app\xfa_ffwidget.cpp @ 1107]
    005a1927 pdfium_test!XFA_LoadImageData+0x00000277 [xfa\fxfa\app\xfa_ffwidget.cpp @ 1032]
    0059514b pdfium_test!CXFA_ImageLayoutData::LoadImageData+0x0000006b [xfa\fxfa\app\xfa_ffwidgetacc.cpp @ 96]
    005951b1 pdfium_test!CXFA_WidgetAcc::LoadImageImage+0x00000011 [xfa\fxfa\app\xfa_ffwidgetacc.cpp @ 1002]
    0058cfa8 pdfium_test!CXFA_FFPageWidgetIterator::MoveToNext+0x00000018 [xfa\fxfa\app\xfa_ffpageview.cpp @ 166]
    003696b7 pdfium_test!CPDFSDK_Document::GetPageView+0x00000087 [fpdfsdk\fsdk_mgr.cpp @ 268]
    0035e73e pdfium_test!FORM_OnAfterLoadPage+0x0000002e [fpdfsdk\fpdfformfill.cpp @ 642]
    00355517 pdfium_test!RenderPage+0x00000047 [samples\pdfium_test.cc @ 498]
    00355b02 pdfium_test!RenderPdf+0x00000302 [samples\pdfium_test.cc @ 694]
    0035bb1e pdfium_test!main+0x0000042e [samples\pdfium_test.cc @ 836]
    006905d6 pdfium_test!__scrt_common_main_seh+0x000000ff [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 264]
    7528338a kernel32!BaseThreadInitThunk+0x0000000e
    77589a02 ntdll!__RtlUserThreadStart+0x00000070
    775899d5 ntdll!_RtlUserThreadStart+0x0000001b

---------------------------
Source Code Information
---------------------------
The OOB access range can be 0x3e4.

  int startX = pCodec->m_startX;
  int startY = pCodec->m_startY;
  int sizeX = pCodec->m_sizeX;
  int sizeY = pCodec->m_sizeY;
  int Bpp = pDevice->GetBPP() / 8;
  FX_ARGB argb = pCodec->m_pSrcPalette[pal_index];  // <--------- CRASHED!!!

0:000> dv
        pModule = 0x096a4f30
        rcd_pos = <value unavailable>
         img_rc = 0x0118f94c
        pal_num = 0n0
        pal_ptr = 0x00000000
     delay_time = 0n0
     user_input = 0n0
    trans_index = 0n-1
disposal_method = 0n0
      interlace = 0n0
   error_status = 0n157962032 (No matching enumerant)
            Bpp = <value unavailable>
       pPalette = <value unavailable>
      pal_index = 0n249      <----------------------------- pal_index = 249
         startY = 0n0
          sizeX = 0n199
           argb = <value unavailable>
        pDevice = 0x0a1c7fd8
          sizeY = 0n199
              i = <value unavailable>
            row = <value unavailable>
      pScanline = <value unavailable>
      
0:000> r ebx
ebx=000000f9

0:000> ?ebx*4
Evaluate expression: 996 = 000003e4

---------------------------
Stacktrace Information
---------------------------
0:000> k
ChildEBP RetAddr  
0118f914 00701c81 pdfium_test!CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback+0x156 [core\fxcodec\codec\fx_codec_progress.cpp @ 674]
0118f95c 00705548 pdfium_test!gif_get_record_position+0x51 [core\fxcodec\codec\fx_codec_gif.cpp @ 67]
0118f9b4 00701965 pdfium_test!gif_load_frame+0x148 [core\fxcodec\lgif\fx_gif.cpp @ 862]
0118f9d8 006fded9 pdfium_test!CCodec_GifModule::LoadFrame+0x35 [core\fxcodec\codec\fx_codec_gif.cpp @ 146]
0118fa1c 005a1b22 pdfium_test!CCodec_ProgressiveDecoder::ContinueDecode+0x219 [core\fxcodec\codec\fx_codec_progress.cpp @ 2119]
0118fa84 005a1927 pdfium_test!XFA_LoadImageFromBuffer+0x1b2 [xfa\fxfa\app\xfa_ffwidget.cpp @ 1107]
0118fadc 0059514b pdfium_test!XFA_LoadImageData+0x277 [xfa\fxfa\app\xfa_ffwidget.cpp @ 1032]
0118fb10 005951b1 pdfium_test!CXFA_ImageLayoutData::LoadImageData+0x6b [xfa\fxfa\app\xfa_ffwidgetacc.cpp @ 96]
0118fb1c 0061a488 pdfium_test!CXFA_WidgetAcc::LoadImageImage+0x11 [xfa\fxfa\app\xfa_ffwidgetacc.cpp @ 1002]
0118fb24 0058cd83 pdfium_test!CXFA_FFImage::LoadWidget+0x28 [xfa\fxfa\app\xfa_ffimage.cpp @ 28]
0118fb38 0058cfa8 pdfium_test!CXFA_FFPageWidgetIterator::GetWidget+0x83 [xfa\fxfa\app\xfa_ffpageview.cpp @ 198]
0118fb48 00369f4d pdfium_test!CXFA_FFPageWidgetIterator::MoveToNext+0x18 [xfa\fxfa\app\xfa_ffpageview.cpp @ 166]
0118fb78 003696b7 pdfium_test!CPDFSDK_PageView::LoadFXAnnots+0x8d [fpdfsdk\fsdk_mgr.cpp @ 921]
0118fb8c 0035e73e pdfium_test!CPDFSDK_Document::GetPageView+0x87 [fpdfsdk\fsdk_mgr.cpp @ 268]
(Inline) -------- pdfium_test!?A0x06ce08b4::FormHandleToPageView+0x2a [fpdfsdk\fpdfformfill.cpp @ 45]
0118fba0 00355517 pdfium_test!FORM_OnAfterLoadPage+0x2e [fpdfsdk\fpdfformfill.cpp @ 642]
0118fc94 00355b02 pdfium_test!RenderPage+0x47 [samples\pdfium_test.cc @ 498]
0118fdb0 0035bb1e pdfium_test!RenderPdf+0x302 [samples\pdfium_test.cc @ 694]
0118feec 006905d6 pdfium_test!main+0x42e [samples\pdfium_test.cc @ 836]
(Inline) -------- pdfium_test!invoke_main+0x1d [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 74]
0118ff38 7528338a pdfium_test!__scrt_common_main_seh+0xff [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 264]
0118ff44 77589a02 kernel32!BaseThreadInitThunk+0xe
0118ff84 775899d5 ntdll!__RtlUserThreadStart+0x70
0118ff9c 00000000 ntdll!_RtlUserThreadStart+0x1b

---------------------------
PoC Diff
---------------------------
I've already did some difference reduction work. To trigger the vulnerability, nine bytes in the original seed gif image were deleted. The bytes begins at file offset 0x0A and they were presented as follows.
80 00 00 00 00 FF FF 00 00

After this mutation, the LogicalScreenDescriptor and the GlobalColorTable structs of the gif image was corrupted.

VERSION
Chrome Version: [52.0.2743.19] + [dev]
Operating System: [Windows 7 SP1]

REPRODUCTION CASE
Both the original normal gif file, the malformed gif file, and the proof-of-concept PDF file were attached.

FOR CRASHES, PLEASE INCLUDE THE FOLLOWING ADDITIONAL INFORMATION
Type of crash: [tab]


 
Proof-of-concept files are attached here.

Comment 2 Deleted

Project Member

Comment 3 by ClusterFuzz, Jun 2 2016

ClusterFuzz is analyzing your testcase. Developers can follow the progress at https://cluster-fuzz.appspot.com/testcase?key=5223049339338752
Project Member

Comment 4 by ClusterFuzz, Jun 2 2016

Labels: Stability-Memory-AddressSanitizer Security_Impact-Head
Status: Available (was: Unconfirmed)

Comment 5 by f...@chromium.org, Jun 3 2016

Components: Infra>Client>Pdfium
Labels: Security_Severity-Medium M-53
Owner: tsepez@chromium.org
Status: Assigned (was: Available)
tsepez, PTAL?
Components: Internals>Plugins>PDF
Components: -Infra>Client>Pdfium
Owner: och...@chromium.org
Punting all of these to ochang.
Cc: och...@chromium.org
Owner: hong_zh...@foxitsoftware.com
hong_zhang, could you please route this security bug to the appropriate person? thanks.
Project Member

Comment 10 by sheriffbot@chromium.org, Jun 4 2016

Labels: ReleaseBlock-Beta
This issue is a security regression. If you are not able to fix this quickly, please revert the change that introduced it.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 11 by sheriffbot@chromium.org, Jun 4 2016

Labels: Pri-1
Project Member

Comment 12 by ClusterFuzz, Jun 8 2016

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5223049339338752

Uploader: felt@google.com
Job Type: linux_asan_pdfium
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 4
Crash Address: 0x6090000019c4
Crash State:
  CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback
  gif_get_record_position
  gif_load_frame
  
Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_pdfium&range=393856:393893

Minimized Testcase (5.70 Kb): https://cluster-fuzz.appspot.com/download/AMIfv97Y14a_YzjHUmkkfzQMzhZ6V8ZDyAphc5kngAjMnewC8L-Z30nctYDm1pvibbEH38YX5uvP4reXQgblYHdBktnS_g_-6No_ro31o_aykiAL-P04Vz_2598twxFjhODhgTUoiJAylYZKZSj_TD-IVEgzCmjiDg

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
 Issue 618292  has been merged into this issue.
 Issue 618297  has been merged into this issue.
Project Member

Comment 15 by ClusterFuzz, Jun 10 2016

ClusterFuzz has detected this issue as fixed in range 399086:399117.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5223049339338752

Uploader: felt@google.com
Job Type: linux_asan_pdfium
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 4
Crash Address: 0x6090000019c4
Crash State:
  CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback
  gif_get_record_position
  gif_load_frame
  
Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_pdfium&range=393856:393893
Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_pdfium&range=399086:399117

Minimized Testcase (5.70 Kb): https://cluster-fuzz.appspot.com/download/AMIfv97Y14a_YzjHUmkkfzQMzhZ6V8ZDyAphc5kngAjMnewC8L-Z30nctYDm1pvibbEH38YX5uvP4reXQgblYHdBktnS_g_-6No_ro31o_aykiAL-P04Vz_2598twxFjhODhgTUoiJAylYZKZSj_TD-IVEgzCmjiDg

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 16 by ClusterFuzz, Jun 10 2016

ClusterFuzz has detected this issue as fixed in range 399086:399117.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5223049339338752

Uploader: felt@google.com
Job Type: linux_asan_pdfium
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 4
Crash Address: 0x6090000019c4
Crash State:
  CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback
  gif_get_record_position
  gif_load_frame
  
Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_pdfium&range=393856:393893
Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_pdfium&range=399086:399117

Minimized Testcase (5.70 Kb): https://cluster-fuzz.appspot.com/download/AMIfv97Y14a_YzjHUmkkfzQMzhZ6V8ZDyAphc5kngAjMnewC8L-Z30nctYDm1pvibbEH38YX5uvP4reXQgblYHdBktnS_g_-6No_ro31o_aykiAL-P04Vz_2598twxFjhODhgTUoiJAylYZKZSj_TD-IVEgzCmjiDg

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Labels: Security_Impact-None
Project Member

Comment 18 by ClusterFuzz, Jun 14 2016

Labels: ClusterFuzz-Verified
Status: Verified (was: Assigned)
ClusterFuzz testcase is verified as fixed, closing issue.

If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
Project Member

Comment 19 by sheriffbot@chromium.org, Jun 14 2016

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify
Labels: -ClusterFuzz-Verified
Status: Assigned (was: Verified)
Sorry for the incorrect ClusterFuzz update, please ignore it. Reopening bug.
[Bulk edit]

Per inferno@, Security_Impact=None bugs should not be release blockers.
Labels: -ReleaseBlock-Beta
Project Member

Comment 23 by ClusterFuzz, Jun 16 2016

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6158989385793536

Fuzzer: pdf_codec_png_fuzzer
Job Type: libfuzzer_chrome_asan
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 4
Crash Address: 0x60300000e858
Crash State:
  CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback
  gif_get_record_position
  gif_load_frame
  
Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=398287:398366

Minimized Testcase (3.02 Kb): https://cluster-fuzz.appspot.com/download/AMIfv95KDrVFHh2iYu0toQg5x3yjnBVMMm2aNuUYGGyoHh5fDEOzrMGkMvMEGIRbpvmICXdODzxDm9hYCO-Iut9rws9nM8QQ1lVZ5Os1mXHNim13fMT0AEFxAJj6yxCXtoMAKEAEOVfVWSLaUuX4NkSySeXJQYvmbA

Filer: mmoroz

See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.
Blocking: 62400
Labels: -Pri-1 Pri-2
XFA has been disabled as we fix some issues, blocking the XFA bug on this one and changing the priority.
Blocking:
Project Member

Comment 26 by ClusterFuzz, Jun 17 2016

ClusterFuzz has detected this issue as fixed in range 400121:400191.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6158989385793536

Fuzzer: pdf_codec_png_fuzzer
Job Type: libfuzzer_chrome_asan
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 4
Crash Address: 0x60300000e858
Crash State:
  CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback
  gif_get_record_position
  gif_load_frame
  
Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=398287:398366
Fixed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=400121:400191

Minimized Testcase (3.02 Kb): https://cluster-fuzz.appspot.com/download/AMIfv95KDrVFHh2iYu0toQg5x3yjnBVMMm2aNuUYGGyoHh5fDEOzrMGkMvMEGIRbpvmICXdODzxDm9hYCO-Iut9rws9nM8QQ1lVZ5Os1mXHNim13fMT0AEFxAJj6yxCXtoMAKEAEOVfVWSLaUuX4NkSySeXJQYvmbA

See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 27 by ClusterFuzz, Jun 22 2016

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5035050550951936

Fuzzer: pdf_codec_gif_fuzzer
Job Type: libfuzzer_chrome_asan
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 4
Crash Address: 0x60400000df3c
Crash State:
  CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback
  gif_get_record_position
  gif_load_frame
  
Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=400757:400887

Minimized Testcase (0.25 Kb): https://cluster-fuzz.appspot.com/download/AMIfv94DI0Q40fBvlfuQ8KgkYGk52KymgTp_bRFB8UvfQreaCTsY0s2EIgippva9TjSz9AfwYEGDPS5LQmpix3acgqbmNrY10UNEf2nROkfmOl8WV4WC8S0_A9Z9Pw3LTbDc1xsKoGvm7SwSfmEoKYD3P-_um2QvGQ?testcase_id=5035050550951936

Filer: mmoroz

See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.
Project Member

Comment 28 by ClusterFuzz, Aug 31 2016

Labels: Stability-AFL
Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5220208373661696

Fuzzer: afl_pdf_codec_gif_fuzzer
Job Type: afl_chrome_asan
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 4
Crash Address: 0x60200000ee70
Crash State:
  CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback
  gif_get_record_position
  gif_load_frame
  
Recommended Security Severity: Low

Regressed: https://cluster-fuzz.appspot.com/revisions?job=afl_chrome_asan&range=402185:402404

Minimized Testcase (0.07 Kb): https://cluster-fuzz.appspot.com/download/AMIfv97BVjpFJDV8vta46iyvR_-Jf_uE6j6is16r62Ai_n_IaKPk7GWT1-wf4YeHzMgMtxs_uRkc9MN8Z_TxfUCmDFLcVWWpy6LrLKmryCeRiWr2xkPj1zZQazjbmIZgxeHGFBG-otNpbkbsAWRmUhVCIolrTxgybQ?testcase_id=5220208373661696

Additional requirements: Requires Gestures

See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.
Project Member

Comment 29 by ClusterFuzz, Sep 1 2016

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6671508598685696

Fuzzer: afl_pdf_codec_gif_fuzzer
Job Type: afl_chrome_asan
Platform Id: linux

Crash Type: Heap-use-after-free READ 4
Crash Address: 0x60400000df24
Crash State:
  CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback
  gif_get_record_position
  gif_load_frame
  
Recommended Security Severity: High

Regressed: https://cluster-fuzz.appspot.com/revisions?job=afl_chrome_asan&range=402185:402404

Minimized Testcase (0.11 Kb): https://cluster-fuzz.appspot.com/download/AMIfv960SQTzIMz5zhPTwDX3hGq6foKL3jESwfm2L5tvT34hYPwOFu5Sk19OaQHC8E6hrz7Ir6S7YL8r2b0-RcPbTqoYkBAwuQ9WXTFHv-rCkIqFw5Y8GmTc0UvMgjUO47LAvcRaaa5nfhnixDXPf2ZJNW3ZsttHCg?testcase_id=6671508598685696

See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.
Kindly reminder: this issue is still reproducible.
Blocking: 656204
Project Member

Comment 32 by ClusterFuzz, Jan 17 2017

ClusterFuzz has detected this issue as fixed in range 443949:443963.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6671508598685696

Fuzzer: afl_pdf_codec_gif_fuzzer
Job Type: afl_chrome_asan
Platform Id: linux

Crash Type: Heap-use-after-free READ 4
Crash Address: 0x60400000df24
Crash State:
  CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback
  gif_get_record_position
  gif_load_frame
  
Sanitizer: address (ASAN)

Recommended Security Severity: High

Regressed: https://cluster-fuzz.appspot.com/revisions?job=afl_chrome_asan&range=402185:402404
Fixed: https://cluster-fuzz.appspot.com/revisions?job=afl_chrome_asan&range=443949:443963

Minimized Testcase (0.11 Kb): https://cluster-fuzz.appspot.com/download/AMIfv960SQTzIMz5zhPTwDX3hGq6foKL3jESwfm2L5tvT34hYPwOFu5Sk19OaQHC8E6hrz7Ir6S7YL8r2b0-RcPbTqoYkBAwuQ9WXTFHv-rCkIqFw5Y8GmTc0UvMgjUO47LAvcRaaa5nfhnixDXPf2ZJNW3ZsttHCg?testcase_id=6671508598685696

See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 33 by ClusterFuzz, Jan 18 2017

ClusterFuzz has detected this issue as fixed in range 443963:443986.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5220208373661696

Fuzzer: afl_pdf_codec_gif_fuzzer
Job Type: afl_chrome_asan
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 4
Crash Address: 0x60200000ee70
Crash State:
  CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback
  gif_get_record_position
  gif_load_frame
  
Sanitizer: address (ASAN)

Recommended Security Severity: Low

Regressed: https://cluster-fuzz.appspot.com/revisions?job=afl_chrome_asan&range=402185:402404
Fixed: https://cluster-fuzz.appspot.com/revisions?job=afl_chrome_asan&range=443963:443986

Minimized Testcase (0.07 Kb): https://cluster-fuzz.appspot.com/download/AMIfv97BVjpFJDV8vta46iyvR_-Jf_uE6j6is16r62Ai_n_IaKPk7GWT1-wf4YeHzMgMtxs_uRkc9MN8Z_TxfUCmDFLcVWWpy6LrLKmryCeRiWr2xkPj1zZQazjbmIZgxeHGFBG-otNpbkbsAWRmUhVCIolrTxgybQ?testcase_id=5220208373661696

Additional requirements: Requires Gestures

See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 34 by ClusterFuzz, Feb 15 2017

ClusterFuzz has detected this issue as fixed in range 450434:450482.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5035050550951936

Fuzzer: pdf_codec_gif_fuzzer
Job Type: libfuzzer_chrome_asan
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 4
Crash Address: 0x60400000df3c
Crash State:
  CCodec_ProgressiveDecoder::GifInputRecordPositionBufCallback
  gif_get_record_position
  gif_load_frame
  
Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=400757:400887
Fixed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=450434:450482

Reproducer Testcase: https://cluster-fuzz.appspot.com/download/AMIfv95y7r51UjpPYgbMY-DlVj9poFzrL8ZOv9ex8WgBKhXCOdEo8Y5O3tdZ-9SlViJV0y5XuFivNJ3KY4jD8RKAFokIHhuAvvVJlsjEJAvFNJMOFpt4UtM22h2stwa_HyeHQ5j9YfRqZ0Xww5Kc1WDX4qpu8df-1f8Iol-w_QfVciSwFGsdF_4Wb8FcK6scHrgQgQ8Yxo3ovkSsA8RMlezMZn-AFCIcvknm2wYJgxIAiadrYpA_2hJLDo1xeRT2pPiVpu1PTUUQ9voOTHQxHcKHgmHSuWkTC5bfkbiOHolpdqYld1oq4JuRrS77y7WdWMYH5BApcuO0pMJrK91rhcX-7YUBtLkO7D8Kg0UHH9-rzzv6H7eEdM0?testcase_id=5035050550951936


See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 35 by ClusterFuzz, Mar 16 2017

Labels: OS-Linux
Labels: reward-NA
For more information, please see https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reference.md.

The link referenced in the description is no longer valid.

(bulk edit)
Owner: rharrison@chromium.org
Status: Fixed (was: Assigned)
Confirmed this no long reproduces
Project Member

Comment 40 by sheriffbot@chromium.org, May 8 2018

Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment