New issue
Advanced search Search tips

Issue 638168 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner:
Closed: Oct 2016
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 1
Type: Bug-Security



Sign in to add a comment

Heap-buffer-overflow in ps_table_add

Project Member Reported by ClusterFuzz, Aug 16 2016

Issue description

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=4969006924824576

Fuzzer: attekett_surku_fuzzer
Job Type: linux_asan_chrome_mp
Platform Id: linux

Crash Type: Heap-buffer-overflow READ {*}
Crash Address: 0x61b00001bfc4
Crash State:
  ps_table_add
  parse_encoding
  parse_dict
  
Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=314095:314100

Minimized Testcase (24.59 Kb): https://cluster-fuzz.appspot.com/download/AMIfv94_jAfYfnHofFs23mihTjP7HjB9t5JStlCtda5V4ogq2aBoMdnKvqho-XEWfdgP90Qy8nf3KxArb1yM-3VwquLIFP0zxgWDAtjgp3pvBm4JA-G2Qb8xml_Ek7jY5aA8cfVCBbpqasvneTFSuYxfuGb0AatIRcLdXrBH-9Z08uYqd7GYwgI?testcase_id=4969006924824576

Issue manually filed by: mmoroz

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
 

Comment 1 by mmoroz@chromium.org, Aug 16 2016

Components: Internals>Plugins>PDF
Labels: Pri-2
Looks pretty similar to  bug 610644 , but pdfium part of the stacktrace differs.
Project Member

Comment 2 by sheriffbot@chromium.org, Aug 16 2016

Labels: M-53
Project Member

Comment 3 by sheriffbot@chromium.org, Aug 16 2016

Labels: -Pri-2 Pri-1
Owner: bunge...@chromium.org
Status: Available (was: Untriaged)
bungeman@, could you take a look? It looks quite similar to  bug 610644 .
Please feel free to reassign. Thanks! 
Project Member

Comment 5 by sheriffbot@chromium.org, Aug 17 2016

Status: Assigned (was: Available)
Project Member

Comment 6 by sheriffbot@chromium.org, Aug 30 2016

bungeman: Uh oh! This issue still open and hasn't been updated in the last 14 days. This is a serious vulnerability, and we want to ensure that there's progress. Could you please leave an update with the current status and any potential blockers?

If you're not the right owner for this issue, could you please remove yourself as soon as possible or help us find the right one?

If the issue is fixed or you can't reproduce it, please close the bug. If you've started working on a fix, please set the status to Started.

Thanks for your time! To disable nags, add the Disable-Nags label.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 7 by sheriffbot@chromium.org, Sep 13 2016

bungeman: Uh oh! This issue still open and hasn't been updated in the last 28 days. This is a serious vulnerability, and we want to ensure that there's progress. Could you please leave an update with the current status and any potential blockers?

If you're not the right owner for this issue, could you please remove yourself as soon as possible or help us find the right one?

If the issue is fixed or you can't reproduce it, please close the bug. If you've started working on a fix, please set the status to Started.

Thanks for your time! To disable nags, add the Disable-Nags label.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Status: WontFix (was: Assigned)
I can't reproduce this with:
1) up-to-date system FreeType on Ubuntu 14.04
2) PDFium's bundled FreeType.
Project Member

Comment 9 by sheriffbot@chromium.org, Oct 5 2016

Labels: -reward-topanel reward-ineligible
Project Member

Comment 10 by sheriffbot@chromium.org, Jan 11 2017

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 11 by ClusterFuzz, Feb 28 2017

ClusterFuzz has detected this issue as fixed in range 453200:453220.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=4969006924824576

Fuzzer: attekett_surku_fuzzer
Job Type: linux_asan_chrome_mp
Platform Id: linux

Crash Type: Heap-buffer-overflow READ {*}
Crash Address: 0x61b00001bfc4
Crash State:
  ps_table_add
  parse_encoding
  parse_dict
  
Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=314095:314100
Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=453200:453220

Reproducer Testcase: https://cluster-fuzz.appspot.com/download/AMIfv94_jAfYfnHofFs23mihTjP7HjB9t5JStlCtda5V4ogq2aBoMdnKvqho-XEWfdgP90Qy8nf3KxArb1yM-3VwquLIFP0zxgWDAtjgp3pvBm4JA-G2Qb8xml_Ek7jY5aA8cfVCBbpqasvneTFSuYxfuGb0AatIRcLdXrBH-9Z08uYqd7GYwgI?testcase_id=4969006924824576


See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 12 by ClusterFuzz, Mar 1 2017

ClusterFuzz has detected this issue as fixed in range 453200:453220.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=4969006924824576

Fuzzer: attekett_surku_fuzzer
Job Type: linux_asan_chrome_mp
Platform Id: linux

Crash Type: Heap-buffer-overflow READ {*}
Crash Address: 0x61b00001bfc4
Crash State:
  ps_table_add
  parse_encoding
  parse_dict
  
Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=314095:314100
Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=453200:453220

Reproducer Testcase: https://cluster-fuzz.appspot.com/download/AMIfv94_jAfYfnHofFs23mihTjP7HjB9t5JStlCtda5V4ogq2aBoMdnKvqho-XEWfdgP90Qy8nf3KxArb1yM-3VwquLIFP0zxgWDAtjgp3pvBm4JA-G2Qb8xml_Ek7jY5aA8cfVCBbpqasvneTFSuYxfuGb0AatIRcLdXrBH-9Z08uYqd7GYwgI?testcase_id=4969006924824576


See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.

Sign in to add a comment