New issue
Advanced search Search tips

Issue 655951 link

Starred by 1 user

Issue metadata

Status: Duplicate
Merged: issue 599865
Owner:
Closed: Oct 2016
Cc:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 1
Type: Bug-Security



Sign in to add a comment

Heap-buffer-overflow in parse_encoding

Project Member Reported by ClusterFuzz, Oct 14 2016

Issue description

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6018653332176896

Fuzzer: attekett_surku_fuzzer
Job Type: linux_lsan_chrome_mp
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 1
Crash Address: 0x62100006c8f4
Crash State:
  parse_encoding
  t1_load_keyword
  parse_dict
  
Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_lsan_chrome_mp&range=314095:314100

Minimized Testcase (25.51 Kb): https://cluster-fuzz.appspot.com/download/AMIfv94Vvnj3JwqebmoLzKkB-MiB72be0loiqFhaTVbqwd4xsHnxpsg88O7R6J_BuxUwrQxacp4AigmdsTk575N9iyCVStIOhvaSc6Sf6llCCvVjTXa6RL8A5TWUtAsj9vskFZ1hvgoNpR77ElF49i_gvEKcYNc_8uFsQcEFn63bKCXys2r9Hkc?testcase_id=6018653332176896

Issue filed automatically.

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
 
Project Member

Comment 1 by sheriffbot@chromium.org, Oct 14 2016

Labels: M-54
Project Member

Comment 2 by sheriffbot@chromium.org, Oct 14 2016

Labels: Pri-1

Comment 3 by mmoroz@chromium.org, Oct 14 2016

Mergedinto: 599865
Owner: bunge...@chromium.org
Status: Duplicate (was: Untriaged)
Yet another one crash due to old version of freetype2 used for testing.
Project Member

Comment 4 by sheriffbot@chromium.org, Oct 15 2016

Labels: -reward-topanel reward-ineligible
Project Member

Comment 5 by sheriffbot@chromium.org, Jan 20 2017

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 6 by ClusterFuzz, Feb 28 2017

ClusterFuzz has detected this issue as fixed in range 453200:453220.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6018653332176896

Fuzzer: attekett_surku_fuzzer
Job Type: linux_lsan_chrome_mp
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 1
Crash Address: 0x62100006c8f4
Crash State:
  parse_encoding
  t1_load_keyword
  parse_dict
  
Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_lsan_chrome_mp&range=314095:314100
Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_lsan_chrome_mp&range=453200:453220

Reproducer Testcase: https://cluster-fuzz.appspot.com/download/AMIfv94Vvnj3JwqebmoLzKkB-MiB72be0loiqFhaTVbqwd4xsHnxpsg88O7R6J_BuxUwrQxacp4AigmdsTk575N9iyCVStIOhvaSc6Sf6llCCvVjTXa6RL8A5TWUtAsj9vskFZ1hvgoNpR77ElF49i_gvEKcYNc_8uFsQcEFn63bKCXys2r9Hkc?testcase_id=6018653332176896


See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.

Sign in to add a comment