New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 656621 link

Starred by 1 user

Issue metadata

Status: Verified
Owner:
Closed: Jan 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 2
Type: Bug-Security

Blocking:
issue 62400



Sign in to add a comment

Crash in put1bitbwtile

Project Member Reported by ClusterFuzz, Oct 17 2016

Issue description

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=4963248468393984

Fuzzer: libfuzzer_radamsa_pdf_codec_tiff_fuzzer
Job Type: libfuzzer_chrome_asan
Platform Id: linux

Crash Type: UNKNOWN READ
Crash Address: 0x7f6333eb7813
Crash State:
  put1bitbwtile
  gtTileContig
  TIFFReadRGBAImageOriented
  
Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=422880:422991

Minimized Testcase (0.38 Kb): https://cluster-fuzz.appspot.com/download/AMIfv956RJ18r64nwREqZVJGzff9R9b4utAb7B1Bcjs_ST6YV5-6Fj-IAaYKs4TEBeCyOpV20YUok05oIuuKzpq991jIBMXqmOgV2i9aALrfYzmkpjpir6LUN1VMFgiPZZXIaSF3-xt-8vsOzgeZXlymcRs06NltWQ?testcase_id=4963248468393984

Issue filed automatically.

See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.
 

Comment 1 by mmoroz@chromium.org, Oct 17 2016

Cc: mmoroz@chromium.org kcc@chromium.org aizatsky@chromium.org infe...@chromium.org
Components: Internals>Plugins>PDF
Owner: thestig@chromium.org
Status: Available (was: Untriaged)
Cool, yet another one crash with radamsa.

thestig@, could you please help to find an owner?
Labels: Pri-2
So we have a bunch of libtiff bugs in general. Do we have a contact in the libtiff organization that we can talk to to get some of these bugs upstream?

For this bug in particular, the attached patch fixes it for me. Toggling debug mode (I forget which direction) also avoids the bug. The problem being libtiff is assigning large uint32 values to int32 variables. The variables are then used as offsets, and they underflow a buffer.

My patch changes everything to uint32s and that seems to work for this test case. Maybe libtiff should put some limit checks on the input values instead? I don't really understand TIFF, so I have no idea.
bug_656621.diff
3.3 KB Download
Project Member

Comment 3 by sheriffbot@chromium.org, Oct 18 2016

Labels: M-55
Project Member

Comment 4 by sheriffbot@chromium.org, Oct 18 2016

Labels: ReleaseBlock-Beta
This issue is a security regression. If you are not able to fix this quickly, please revert the change that introduced it.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 5 by sheriffbot@chromium.org, Oct 18 2016

Labels: -Pri-2 Pri-1
Project Member

Comment 6 by sheriffbot@chromium.org, Oct 18 2016

Status: Assigned (was: Available)
Blocking: 62400
Labels: -Pri-1 -ReleaseBlock-Beta -Security_Severity-Medium -Security_Impact-Head ReleaseBlock-NA Pri-2
TIFF is XFA only.
Labels: Security_Severity-Medium Security_Impact-None
Project Member

Comment 9 by sheriffbot@chromium.org, Oct 20 2016

Labels: -ReleaseBlock-NA
Owner: dsinclair@chromium.org
Punting PDF security-ish bugs.
Labels: -M-55
Project Member

Comment 12 by ClusterFuzz, Jan 12 2017

ClusterFuzz has detected this issue as fixed in range 442985:443138.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=4963248468393984

Fuzzer: libfuzzer_radamsa_pdf_codec_tiff_fuzzer
Job Type: libfuzzer_chrome_asan
Platform Id: linux

Crash Type: UNKNOWN READ
Crash Address: 0x7f6333eb7813
Crash State:
  put1bitbwtile
  gtTileContig
  TIFFReadRGBAImageOriented
  
Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Regressed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=422880:422991
Fixed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=442985:443138

Minimized Testcase (0.38 Kb): https://cluster-fuzz.appspot.com/download/AMIfv956RJ18r64nwREqZVJGzff9R9b4utAb7B1Bcjs_ST6YV5-6Fj-IAaYKs4TEBeCyOpV20YUok05oIuuKzpq991jIBMXqmOgV2i9aALrfYzmkpjpir6LUN1VMFgiPZZXIaSF3-xt-8vsOzgeZXlymcRs06NltWQ?testcase_id=4963248468393984

See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 13 by ClusterFuzz, Jan 12 2017

Labels: ClusterFuzz-Verified
Status: Verified (was: Assigned)
ClusterFuzz testcase 4963248468393984 is verified as fixed, so closing issue.

If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
Project Member

Comment 14 by sheriffbot@chromium.org, Jan 12 2017

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify
Project Member

Comment 15 by sheriffbot@chromium.org, Apr 20 2017

Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment