Issue metadata
Sign in to add a comment
|
Stack-buffer-overflow in Hunspell::suggest |
||||||||||||||||||||||
Issue descriptionDetailed report: https://cluster-fuzz.appspot.com/testcase?key=6316104744173568 Fuzzer: libfuzzer_hunspell_fuzzer Job Type: libfuzzer_chrome_asan Platform Id: linux Crash Type: Stack-buffer-overflow WRITE {*} Crash Address: 0x7ff9a9df6a70 Crash State: Hunspell::suggest Hunspell::suggest Recommended Security Severity: High Regressed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=414871:414881 Minimized Testcase (0.10 Kb): https://cluster-fuzz.appspot.com/download/AMIfv96uGY-R2IlAazOz453Gq1xM2qLy-l_U3ax8ZmMlMBoz1VFSRNCycdvgDfgEm65YauMn219bq0DaiUlTC4ETWHBkx8qZd87qqH2_pUnLDKczMlxpDzzguUNjTo5F39VX4oYxIJ652sshfdTz0WB8KkQcnbLDyA?testcase_id=6316104744173568 Issue manually filed by: inferno See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.
,
Aug 29 2016
,
Aug 29 2016
This issue is a security regression. If you are not able to fix this quickly, please revert the change that introduced it. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Aug 29 2016
,
Aug 29 2016
,
Sep 1 2016
,
Sep 2 2016
Additional context: Yes, hunspell has issues. That's the reason we isolated it into the render process in the first place - untrusted third-party code. Here's why I don't think this is P1: 1) The exploit for this is extremely difficult to trigger. It requires * The user typing a specific word into an editable field. * The user right-clicking onto the misspelling to actually fix it. * The exploit also depends on the actual dictionary. 2) It is contained in the renderer. 3) hunspell has significantly changed, upgrading most string handling to std::string. We should roll new DEPS, instead of fixing this bug. I'll leave this open for now, since I hope we'll get to a new DEPS roll soon, which might well close many of these bugs. Filed bug #643804 for that. Removing release blocker status (and downgrading priority), because I don't think it's severe enough to justify that.
,
Sep 9 2016
,
Sep 15 2016
Uh, no. Not RBS. See c#7 Also, waiting for update to newest hunspell.
,
Sep 15 2016
,
Sep 28 2016
,
Sep 29 2016
groby: Uh oh! This issue still open and hasn't been updated in the last 14 days. This is a serious vulnerability, and we want to ensure that there's progress. Could you please leave an update with the current status and any potential blockers? If you're not the right owner for this issue, could you please remove yourself as soon as possible or help us find the right one? If the issue is fixed or you can't reproduce it, please close the bug. If you've started working on a fix, please set the status to Started. Thanks for your time! To disable nags, add the Disable-Nags label. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Sep 29 2016
,
Oct 3 2016
Removing RBS and downgrading priority.
,
Oct 4 2016
,
Oct 5 2016
Removing RBS again, and "Security_Impact=Beta" label, which should prevent Sheriffbot from adding the blocker label back.
,
Oct 5 2016
Dropping to low and adding beta. We'll see what sheriffbot thinks ...
,
Oct 8 2016
Yeah. About that "DEPS roll soon" - upstream is a bit discombobulated right now, and failing plenty of our unit tests. So, delaying this further.
,
Oct 13 2016
,
Nov 16 2016
,
Dec 14 2016
ClusterFuzz has detected this issue as fixed in range 438154:438196. Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6316104744173568 Fuzzer: libfuzzer_hunspell_fuzzer Job Type: libfuzzer_chrome_asan Platform Id: linux Crash Type: Stack-buffer-overflow WRITE {*} Crash Address: 0x7ff9a9df6a70 Crash State: Hunspell::suggest Hunspell::suggest Recommended Security Severity: High Regressed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=414871:414881 Fixed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=438154:438196 Minimized Testcase (0.10 Kb): https://cluster-fuzz.appspot.com/download/AMIfv96uGY-R2IlAazOz453Gq1xM2qLy-l_U3ax8ZmMlMBoz1VFSRNCycdvgDfgEm65YauMn219bq0DaiUlTC4ETWHBkx8qZd87qqH2_pUnLDKczMlxpDzzguUNjTo5F39VX4oYxIJ652sshfdTz0WB8KkQcnbLDyA?testcase_id=6316104744173568 See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Dec 14 2016
ClusterFuzz testcase 6316104744173568 is verified as fixed, so closing issue. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
Dec 15 2016
,
Jan 24 2017
,
Mar 23 2017
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Apr 27 2017
|
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by infe...@chromium.org
, Aug 29 2016Status: Assigned (was: Untriaged)