New issue
Advanced search Search tips

Issue 619405 link

Starred by 2 users

Issue metadata

Status: Fixed
Owner:
Closed: Jun 2016
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: 1
Type: Bug-Security



Sign in to add a comment

Security: Heap Buffer Overflow in opj_j2k_read_SQcd_SQcc

Reported by stackexp...@gmail.com, Jun 12 2016

Issue description

Security: PDFium: Heap Buffer Overflow in opj_j2k_read_SQcd_SQcc

VULNERABILITY DETAILS
This heap-buffer-overflow vulnerability was caused by the malformed jpeg2000 image file embedded in the PDF document.
The latest stable version of Chrome (51.0.2704.84 m) is vulnerable to this issue.

----------------------------
AddressSanitizer Information
----------------------------
==4050==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb6103668 at pc 0x0870a663 bp 0xbfd642b8 sp 0xbfd642b0
WRITE of size 4 at 0xb6103668 thread T0
    #0 0x870a662 in opj_j2k_read_SQcd_SQcc out/Release/../../third_party/libopenjpeg20/j2k.c:9027:9
    #1 0x8700ae0 in opj_j2k_read_qcd out/Release/../../third_party/libopenjpeg20/j2k.c:2803:15
    #2 0x870c988 in opj_j2k_read_header_procedure out/Release/../../third_party/libopenjpeg20/j2k.c:7217:26
    #3 0x86d940f in opj_j2k_exec out/Release/../../third_party/libopenjpeg20/j2k.c:7290:43
    #4 0x86d940f in opj_j2k_read_header out/Release/../../third_party/libopenjpeg20/j2k.c:6768
    #5 0x8716371 in opj_jp2_read_header out/Release/../../third_party/libopenjpeg20/jp2.c:2653:9
    #6 0x86cc3bf in opj_read_header out/Release/../../third_party/libopenjpeg20/openjpeg.c:391:10
    #7 0x8549539 in CJPX_Decoder::Init(unsigned char const*, unsigned int) out/Release/../../core/fxcodec/codec/fx_codec_jpx_opj.cpp:751:8
    #8 0x854bcb9 in CCodec_JpxModule::CreateDecoder(unsigned char const*, unsigned int, CPDF_ColorSpace*) out/Release/../../core/fxcodec/codec/fx_codec_jpx_opj.cpp:887:10
    #9 0x83fc272 in CPDF_DIBSource::LoadJpxBitmap() out/Release/../../core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp:634:24
    #10 0x83f2a1e in CPDF_DIBSource::CreateDecoder() out/Release/../../core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp:593:5
    #11 0x83f72e1 in CPDF_DIBSource::StartLoadDIBSource(CPDF_Document*, CPDF_Stream const*, int, CPDF_Dictionary*, CPDF_Dictionary*, int, unsigned int, int) out/Release/../../core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp:311:13
    #12 0x83d984d in CPDF_ImageCacheEntry::StartGetCachedBitmap(CPDF_Dictionary*, CPDF_Dictionary*, int, unsigned int, int, CPDF_RenderStatus*, int, int) out/Release/../../core/fpdfapi/fpdf_render/fpdf_render_cache.cpp:274:25
    #13 0x83d984d in CPDF_PageRenderCache::StartGetCachedBitmap(CPDF_Stream*, int, unsigned int, int, CPDF_RenderStatus*, int, int) out/Release/../../core/fpdfapi/fpdf_render/fpdf_render_cache.cpp:124
    #14 0x84078a4 in CPDF_ImageLoaderHandle::Start(CPDF_ImageLoader*, CPDF_ImageObject const*, CPDF_PageRenderCache*, int, unsigned int, int, CPDF_RenderStatus*, int, int) out/Release/../../core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp:1502:11
    #15 0x840887a in CPDF_ImageLoader::Start(CPDF_ImageObject const*, CPDF_PageRenderCache*, CPDF_ImageLoaderHandle*&, int, unsigned int, int, CPDF_RenderStatus*, int, int) out/Release/../../core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp:1563:10
    #16 0x83e4409 in CPDF_ImageRenderer::StartLoadDIBSource() out/Release/../../core/fpdfapi/fpdf_render/fpdf_render_image.cpp:351:7
    #17 0x83df008 in CPDF_ImageRenderer::Start(CPDF_RenderStatus*, CPDF_PageObject const*, CFX_Matrix const*, int, int) out/Release/../../core/fpdfapi/fpdf_render/fpdf_render_image.cpp:496:7
    #18 0x83c3e8b in CPDF_RenderStatus::ContinueSingleObject(CPDF_PageObject const*, CFX_Matrix const*, IFX_Pause*) out/Release/../../core/fpdfapi/fpdf_render/fpdf_render.cpp:284:10
    #19 0x83cfcec in CPDF_ProgressiveRenderer::Continue(IFX_Pause*) out/Release/../../core/fpdfapi/fpdf_render/fpdf_render.cpp:1038:13
    #20 0x83ced7a in CPDF_ProgressiveRenderer::Start(IFX_Pause*) out/Release/../../core/fpdfapi/fpdf_render/fpdf_render.cpp:999:3
    #21 0x815b491 in FPDF_RenderPage_Retail(CRenderContext*, void*, int, int, int, int, int, int, int, IFSDK_PAUSE_Adapter*) out/Release/../../fpdfsdk/fpdfview.cpp:870:3
    #22 0x815ab11 in FPDF_RenderPageBitmap out/Release/../../fpdfsdk/fpdfview.cpp:606:3
    #23 0x813f069 in RenderPage(std::string const&, void* const&, void* const&, int, Options const&, std::string const&) out/Release/../../samples/pdfium_test.cc:514:5
    #24 0x8140cfb in RenderPdf(std::string const&, char const*, unsigned int, Options const&, std::string const&) out/Release/../../samples/pdfium_test.cc:694:9
    #25 0x8142d13 in main out/Release/../../samples/pdfium_test.cc:835:5
    #26 0xb7496a82 in __libc_start_main /build/eglibc-617sU_/eglibc-2.19/csu/libc-start.c:287
    #27 0x807e5c3 in _start (out/Release/pdfium_test+0x807e5c3)

0xb6103668 is located 8 bytes to the left of 1-byte region [0xb6103670,0xb6103671)
allocated by thread T0 here:
    #0 0x81163ff in calloc (out/Release/pdfium_test+0x81163ff)
    #1 0x870228a in opj_j2k_read_siz out/Release/../../third_party/libopenjpeg20/j2k.c:2095:46
    #2 0x870c988 in opj_j2k_read_header_procedure out/Release/../../third_party/libopenjpeg20/j2k.c:7217:26
    #3 0x86d940f in opj_j2k_exec out/Release/../../third_party/libopenjpeg20/j2k.c:7290:43
    #4 0x86d940f in opj_j2k_read_header out/Release/../../third_party/libopenjpeg20/j2k.c:6768

SUMMARY: AddressSanitizer: heap-buffer-overflow out/Release/../../third_party/libopenjpeg20/j2k.c:9027 opj_j2k_read_SQcd_SQcc
Shadow bytes around the buggy address:
  0x36c20670: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x36c20680: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x36c20690: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x36c206a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x36c206b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x36c206c0: fa fa fa fa fa fa 01 fa fa fa 01 fa fa[fa]01 fa
  0x36c206d0: fa fa 01 fa fa fa 04 fa fa fa 00 04 fa fa 00 04
  0x36c206e0: fa fa 00 04 fa fa 00 04 fa fa 00 fa fa fa fd fa
  0x36c206f0: fa fa 00 fa fa fa 04 fa fa fa 04 fa fa fa fd fa
  0x36c20700: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x36c20710: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:       fa
  Heap right redzone:      fb
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack partial redzone:   f4
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
  Left alloca redzone:     ca
  Right alloca redzone:    cb
==4050==ABORTING

---------------------------
Exception Information
---------------------------
(1d28.22c0): Access violation - code c0000005 (!!! second chance !!!)
eax=00000000 ebx=003cd474 ecx=0973dff8 edx=003cd44b esi=09b2bc19 edi=09b26f28
eip=0141a744 esp=003cd438 ebp=003cd444 iopl=0         nv up ei pl zr na pe nc
cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
pdfium_test!opj_j2k_read_SQcd_SQcc+0x74:
0141a744 894118        mov  dword ptr [ecx+18h],eax ds:002b:0973e010=????????

---------------------------
Heap Information
---------------------------
0:000> !heap -p -a ecx
    address 0973dff8 found in
    _DPH_HEAP_ROOT @ 171000
    in busy allocation (  DPH_HEAP_BLOCK:         UserAddr         UserSize -         VirtAddr         VirtSize)
                                 95f3ed4:          973dff8                1 -          973d000             2000
    10778e89 verifier!AVrfDebugPageHeapAllocate+0x00000229
    77621d4e ntdll!RtlDebugAllocateHeap+0x00000030
    775db586 ntdll!RtlpAllocateHeap+0x000000c4
    77583541 ntdll!RtlAllocateHeap+0x0000023a
    016c446c pdfium_test!_calloc_base+0x00000047 [d:\th\minkernel\crts\ucrt\src\appcrt\heap\calloc_base.cpp @ 33]
    01415edb pdfium_test!opj_j2k_read_siz+0x0000041b [third_party\libopenjpeg20\j2k.c @ 2244]
    0141ac21 pdfium_test!opj_j2k_read_header_procedure+0x000001d1 [third_party\libopenjpeg20\j2k.c @ 7217]
    0141dd66 pdfium_test!opj_jp2_exec+0x00000036 [third_party\libopenjpeg20\jp2.c @ 2247]
    0141a9ff pdfium_test!opj_j2k_read_header+0x0000007f [third_party\libopenjpeg20\j2k.c @ 6768]
    0141e18f pdfium_test!opj_jp2_read_header+0x0000005f [third_party\libopenjpeg20\jp2.c @ 2653]
    0141580a pdfium_test!opj_read_header+0x0000003a [third_party\libopenjpeg20\openjpeg.c @ 391]
    013d747b pdfium_test!CJPX_Decoder::Init+0x0000013b [core\fxcodec\codec\fx_codec_jpx_opj.cpp @ 751]
    013d6e80 pdfium_test!CCodec_JpxModule::CreateDecoder+0x00000040 [core\fxcodec\codec\fx_codec_jpx_opj.cpp @ 887]
    013c4fb7 pdfium_test!CPDF_DIBSource::LoadJpxBitmap+0x00000067 [core\fpdfapi\fpdf_render\fpdf_render_loadimage.cpp @ 634]
    013c36ac pdfium_test!CPDF_DIBSource::CreateDecoder+0x0000023c [core\fpdfapi\fpdf_render\fpdf_render_loadimage.cpp @ 594]
    013c5bed pdfium_test!CPDF_DIBSource::StartLoadDIBSource+0x0000017d [core\fpdfapi\fpdf_render\fpdf_render_loadimage.cpp @ 311]
    013a1d57 pdfium_test!CPDF_ImageCacheEntry::StartGetCachedBitmap+0x00000067 [core\fpdfapi\fpdf_render\fpdf_render_cache.cpp @ 277]
    013a1e5f pdfium_test!CPDF_PageRenderCache::StartGetCachedBitmap+0x000000cf [core\fpdfapi\fpdf_render\fpdf_render_cache.cpp @ 124]
    013c59d4 pdfium_test!CPDF_ImageLoaderHandle::Start+0x00000044 [core\fpdfapi\fpdf_render\fpdf_render_loadimage.cpp @ 1502]
    013c597d pdfium_test!CPDF_ImageLoader::Start+0x0000005d [core\fpdfapi\fpdf_render\fpdf_render_loadimage.cpp @ 1563]
    013a8b40 pdfium_test!CPDF_ImageRenderer::StartLoadDIBSource+0x00000070 [core\fpdfapi\fpdf_render\fpdf_render_image.cpp @ 351]
    013a85c6 pdfium_test!CPDF_ImageRenderer::Start+0x00000076 [core\fpdfapi\fpdf_render\fpdf_render_image.cpp @ 496]
    0138c253 pdfium_test!CPDF_RenderStatus::ContinueSingleObject+0x000000c3 [core\fpdfapi\fpdf_render\fpdf_render.cpp @ 284]
    0138c064 pdfium_test!CPDF_ProgressiveRenderer::Continue+0x00000294 [core\fpdfapi\fpdf_render\fpdf_render.cpp @ 1038]
    0135ca2c pdfium_test!FPDF_RenderPage_Retail+0x000001fc [fpdfsdk\fpdfview.cpp @ 871]
    0135d67f pdfium_test!FPDF_RenderPageBitmap+0x000000bf [fpdfsdk\fpdfview.cpp @ 609]
    01355689 pdfium_test!RenderPage+0x000001b9 [samples\pdfium_test.cc @ 516]
    01355b02 pdfium_test!RenderPdf+0x00000302 [samples\pdfium_test.cc @ 694]
    0135bb22 pdfium_test!main+0x00000432 [samples\pdfium_test.cc @ 836]
    016a8749 pdfium_test!__scrt_common_main_seh+0x000000ff [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 264]
    7528338a kernel32!BaseThreadInitThunk+0x0000000e
    77589a02 ntdll!__RtlUserThreadStart+0x00000070

---------------------------
Overflow Information
---------------------------
static OPJ_BOOL opj_j2k_read_SQcd_SQcc(opj_j2k_t *p_j2k,
                                                            OPJ_UINT32 p_comp_no,
                                                            OPJ_BYTE* p_header_data,
                                                            OPJ_UINT32 * p_header_size,
                                                            opj_event_mgr_t * p_manager
                                                            )
{
        /* loop*/
        OPJ_UINT32 l_band_no;
        opj_cp_t *l_cp = 00;
        opj_tcp_t *l_tcp = 00;
        opj_tccp_t *l_tccp = 00;
        OPJ_BYTE * l_current_ptr = 00;
        OPJ_UINT32 l_tmp, l_num_band;

        /* preconditions*/
        assert(p_j2k != 00);
        assert(p_manager != 00);
        assert(p_header_data != 00);

        l_cp = &(p_j2k->m_cp);
        /* come from tile part header or main header ?*/
        l_tcp = (p_j2k->m_specific_param.m_decoder.m_state == J2K_STATE_TPH) ? /*FIXME J2K_DEC_STATE_TPH*/
                                &l_cp->tcps[p_j2k->m_current_tile_number] :
                                p_j2k->m_specific_param.m_decoder.m_default_tcp;

        /* precondition again*/
        assert(p_comp_no <  p_j2k->m_private_image->numcomps);

        l_tccp = &l_tcp->tccps[p_comp_no];
        l_current_ptr = p_header_data;

        if (*p_header_size < 1) {
                opj_event_msg(p_manager, EVT_ERROR, "Error reading SQcd or SQcc element\n");
                return OPJ_FALSE;
        }
        *p_header_size -= 1;

        opj_read_bytes(l_current_ptr, &l_tmp ,1);                       /* Sqcx */
        ++l_current_ptr;

        l_tccp->qntsty = l_tmp & 0x1f;               // <------------------------------------------------ Heap Buffer Overflow!!!
        l_tccp->numgbits = l_tmp >> 5;
        if (l_tccp->qntsty == J2K_CCP_QNTSTY_SIQNT) {
        l_num_band = 1;
        }


0:000> dv
          p_j2k = <value unavailable>
      p_comp_no = <value unavailable>
  p_header_data = 0x09b2bc18 "@???"
  p_header_size = 0x003cd474
      p_manager = 0x09b22fd4
         l_tccp = 0x0973dff8    ; <----------------------------- Heap Buffer
          l_tmp = 0x40
          l_tcp = <value unavailable>
  l_current_ptr = 0x09b2bc19 "???"
     l_num_band = <value unavailable>
      l_band_no = <value unavailable>

---------------------------
Stacktrace Information
---------------------------
0:000> k
ChildEBP RetAddr  
003cd444 014163a9 pdfium_test!opj_j2k_read_SQcd_SQcc+0x74 [third_party\libopenjpeg20\j2k.c @ 9027]
003cd464 0141ac21 pdfium_test!opj_j2k_read_qcd+0x19 [third_party\libopenjpeg20\j2k.c @ 2803]
003cd498 0141dd66 pdfium_test!opj_j2k_read_header_procedure+0x1d1 [third_party\libopenjpeg20\j2k.c @ 7217]
003cd4b8 0141a9ff pdfium_test!opj_jp2_exec+0x36 [third_party\libopenjpeg20\jp2.c @ 2247]
003cd4d8 0141e18f pdfium_test!opj_j2k_read_header+0x7f [third_party\libopenjpeg20\j2k.c @ 6768]
003cd4fc 0141580a pdfium_test!opj_jp2_read_header+0x5f [third_party\libopenjpeg20\jp2.c @ 2653]
003cd514 013d747b pdfium_test!opj_read_header+0x3a [third_party\libopenjpeg20\openjpeg.c @ 391]
003cf57c 013d6e80 pdfium_test!CJPX_Decoder::Init+0x13b [core\fxcodec\codec\fx_codec_jpx_opj.cpp @ 751]
003cf590 013c4fb7 pdfium_test!CCodec_JpxModule::CreateDecoder+0x40 [core\fxcodec\codec\fx_codec_jpx_opj.cpp @ 887]
003cf5d4 013c36ac pdfium_test!CPDF_DIBSource::LoadJpxBitmap+0x67 [core\fpdfapi\fpdf_render\fpdf_render_loadimage.cpp @ 634]
003cf604 013c5bed pdfium_test!CPDF_DIBSource::CreateDecoder+0x23c [core\fpdfapi\fpdf_render\fpdf_render_loadimage.cpp @ 594]
003cf628 013a1d57 pdfium_test!CPDF_DIBSource::StartLoadDIBSource+0x17d [core\fpdfapi\fpdf_render\fpdf_render_loadimage.cpp @ 311]
003cf654 013a1e5f pdfium_test!CPDF_ImageCacheEntry::StartGetCachedBitmap+0x67 [core\fpdfapi\fpdf_render\fpdf_render_cache.cpp @ 277]
003cf688 013c59d4 pdfium_test!CPDF_PageRenderCache::StartGetCachedBitmap+0xcf [core\fpdfapi\fpdf_render\fpdf_render_cache.cpp @ 124]
003cf6b8 013c597d pdfium_test!CPDF_ImageLoaderHandle::Start+0x44 [core\fpdfapi\fpdf_render\fpdf_render_loadimage.cpp @ 1502]
003cf6e8 013a8b40 pdfium_test!CPDF_ImageLoader::Start+0x5d [core\fpdfapi\fpdf_render\fpdf_render_loadimage.cpp @ 1563]
003cf740 013a85c6 pdfium_test!CPDF_ImageRenderer::StartLoadDIBSource+0x70 [core\fpdfapi\fpdf_render\fpdf_render_image.cpp @ 351]
003cf750 0138c253 pdfium_test!CPDF_ImageRenderer::Start+0x76 [core\fpdfapi\fpdf_render\fpdf_render_image.cpp @ 496]
003cf778 0138c064 pdfium_test!CPDF_RenderStatus::ContinueSingleObject+0xc3 [core\fpdfapi\fpdf_render\fpdf_render.cpp @ 284]
003cf7cc 0135ca2c pdfium_test!CPDF_ProgressiveRenderer::Continue+0x294 [core\fpdfapi\fpdf_render\fpdf_render.cpp @ 1038]
003cf808 0135d67f pdfium_test!FPDF_RenderPage_Retail+0x1fc [fpdfsdk\fpdfview.cpp @ 871]
003cf848 01355689 pdfium_test!FPDF_RenderPageBitmap+0xbf [fpdfsdk\fpdfview.cpp @ 609]
003cf968 01355b02 pdfium_test!RenderPage+0x1b9 [samples\pdfium_test.cc @ 516]
003cfa84 0135bb22 pdfium_test!RenderPdf+0x302 [samples\pdfium_test.cc @ 694]
003cfbc0 016a8749 pdfium_test!main+0x432 [samples\pdfium_test.cc @ 836]
(Inline) -------- pdfium_test!invoke_main+0x1d [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 74]
003cfc0c 7528338a pdfium_test!__scrt_common_main_seh+0xff [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 264]
003cfc18 77589a02 kernel32!BaseThreadInitThunk+0xe
003cfc58 775899d5 ntdll!__RtlUserThreadStart+0x70
003cfc70 00000000 ntdll!_RtlUserThreadStart+0x1b

VERSION
Chrome Version: [51.0.2704.84 m] + [Stable]
Operating System: [Windows 7 SP1]

REPRODUCTION CASE
Both the the malformed jpeg2000 image file, and the proof-of-concept PDF file were attached.

FOR CRASHES, PLEASE INCLUDE THE FOLLOWING ADDITIONAL INFORMATION
Type of crash: [tab]

 
poc.pdf
1.1 KB Download
poc.jp2
159 bytes Download

Comment 1 Deleted

It seems the COD (0xFF52) component always comes before the QCD (0xFF5C) component. But this condition cannot be guaranteed. 

If the jpeg2000 image doesn't contain a COD component, as described in this issue, your check in function opj_j2k_read_SPCod_SPCoc will be bypassed.

Or if the QCD component comes before the COD component, your check will be bypassed too.

Comment 3 Deleted

A simple patch for this issue.
0016-read_SQcd_SQcc_overflow.patch
1.3 KB Download
Project Member

Comment 5 by ClusterFuzz, Jun 13 2016

ClusterFuzz is analyzing your testcase. Developers can follow the progress at https://cluster-fuzz.appspot.com/testcase?key=5685692965584896
Oh, why it takes so long to run ClusterFuzz? Can any one help me cc a PDFium member?
Project Member

Comment 7 by ClusterFuzz, Jun 15 2016

ClusterFuzz is analyzing your testcase. Developers can follow the progress at https://cluster-fuzz.appspot.com/testcase?key=5221940801568768

Comment 8 by est...@chromium.org, Jun 15 2016

Cc: tsepez@chromium.org
Components: Internals>Plugins>PDF
Labels: Security_Severity-High Security_Impact-Stable
Owner: och...@chromium.org
ochang, do you think you could please take a look at this? Also, I'm not sure why ClusterFuzz is taking so long to analyze and not setting labels.

Comment 9 by est...@chromium.org, Jun 15 2016

Status: Assigned (was: Unconfirmed)
 Issue 620191  has been merged into this issue.
Project Member

Comment 11 by sheriffbot@chromium.org, Jun 15 2016

Labels: M-51
Project Member

Comment 12 by sheriffbot@chromium.org, Jun 15 2016

Labels: Pri-1
stackexploit, feel free to upload a CL to codereview.chromium.org with your patch.
hi ochang, I've already submitted my patch to codereview.chromium.org, please take a look at it.
https://codereview.chromium.org/2071773002/

my first submission :)
oh, I forgot to update the README.pdfium file in libopenjpeg20 :(
The README.pdfium file has been updated.
Project Member

Comment 18 by bugdroid1@chromium.org, Jun 20 2016

Labels: Merge-Request-51 Merge-Request-52
Status: Fixed (was: Assigned)

Comment 20 by tin...@google.com, Jun 22 2016

Labels: -Merge-Request-51 Merge-Review-51 Hotlist-Merge-Review
[Automated comment] DEPS changes referenced in bugdroid comments, needs manual review.

Comment 21 by tin...@google.com, Jun 22 2016

Labels: -Merge-Request-52 Merge-Review-52
[Automated comment] DEPS changes referenced in bugdroid comments, needs manual review.

Comment 22 by tin...@google.com, Jun 22 2016

Labels: -Merge-Request-51 Merge-Review-51 Hotlist-Merge-Review
[Automated comment] DEPS changes referenced in bugdroid comments, needs manual review.
Project Member

Comment 23 by sheriffbot@chromium.org, Jun 22 2016

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify
Before we approve merge to M52, Could you please confirm whether this change is baked/verified in Canary and safe to merge?

Also is this applicable to all OS or any specific OS?
This is applicable to all OSes. It's safe to merge.
Cc: awhalley@chromium.org
Labels: -Merge-Review-52 Merge-Approved-52
Approving merge to M52 branch 2743 based on comment #25. Please merge ASAP. Thank you.

awhalley@ as FYI
Project Member

Comment 27 by bugdroid1@chromium.org, Jun 24 2016

Labels: -merge-approved-52 merge-merged-2743
The following revision refers to this bug:
  http://goto.ext.google.com/viewvc/chrome-internal?view=rev&revision=89063

------------------------------------------------------------------
r89063 | ochang@google.com | 2016-06-24T03:05:00.069831Z

-----------------------------------------------------------------
Labels: reward-topanel
Labels: -reward-topanel reward-unpaid reward-3500
Congratulations!  $3,500 for this one (including $500 for the patch).
Thanks! Please use 'Ke Liu of Tencent's Xuanwu LAB' as the credit information when you're ready to release a newer version of Chrome.
Labels: -reward-unpaid reward-inprocess
Labels: -Merge-Review-51
M51 is done, removing merge request.
Labels: Release-1-M52
Labels: CVE-2016-5140
Hi, I'm going to write an essay about this issue and share it publicly.
Can you tell me when it is OK to do this please?
Hi Ke. Thanks for checking!  Yes, you may publicly talk about this issue.
Project Member

Comment 37 by sheriffbot@chromium.org, Sep 28 2016

Labels: -Restrict-View-SecurityNotify
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 38 by sheriffbot@chromium.org, Oct 1 2016

This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 39 by sheriffbot@chromium.org, Oct 2 2016

This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Labels: allpublic
Labels: CVE_description-submitted

Sign in to add a comment