New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 699457 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner:
Last visit > 30 days ago
Closed: Apr 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 1
Type: Bug-Security



Sign in to add a comment

parsed_output == double_parsed_output. Parser/Writer mismatch.

Project Member Reported by ClusterFuzz, Mar 8 2017

Issue description

Project Member

Comment 1 by sheriffbot@chromium.org, Mar 8 2017

Labels: M-56
Project Member

Comment 2 by sheriffbot@chromium.org, Mar 8 2017

Labels: Pri-1
Dupe of  Issue 699357  ?
Owner: aizatsky@chromium.org
Status: Assigned (was: Untriaged)
The CL that introduced the fuzzer notes: "It's probably worth pointing out that the base json parser is not meant to be security hardened and handle invalid json. So depending on what kind of fuzzing you're doing we may or may not want to act on the results. See https://bugs.chromium.org/p/chromium/issues/detail?id=644664#c5."

It's unclear from this report whether the behavior encountered has any security impact.
Project Member

Comment 5 by sheriffbot@chromium.org, Mar 10 2017

Labels: -M-56 M-57

Comment 6 by tsepez@chromium.org, Mar 14 2017

Components: Internals>Core
Project Member

Comment 7 by sheriffbot@chromium.org, Mar 22 2017

aizatsky: Uh oh! This issue still open and hasn't been updated in the last 14 days. This is a serious vulnerability, and we want to ensure that there's progress. Could you please leave an update with the current status and any potential blockers?

If you're not the right owner for this issue, could you please remove yourself as soon as possible or help us find the right one?

If the issue is fixed or you can't reproduce it, please close the bug. If you've started working on a fix, please set the status to Started.

Thanks for your time! To disable nags, add the Disable-Nags label.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Cc: rsesek@chromium.org
+cc rsesek: should we disregard this one?
Project Member

Comment 9 by sheriffbot@chromium.org, Apr 5 2017

aizatsky: Uh oh! This issue still open and hasn't been updated in the last 28 days. This is a serious vulnerability, and we want to ensure that there's progress. Could you please leave an update with the current status and any potential blockers?

If you're not the right owner for this issue, could you please remove yourself as soon as possible or help us find the right one?

If the issue is fixed or you can't reproduce it, please close the bug. If you've started working on a fix, please set the status to Started.

Thanks for your time! To disable nags, add the Disable-Nags label.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Status: WontFix (was: Assigned)
rsesek@hotwire:/Users/rsesek % xxd /Users/rsesek/Downloads/clusterfuzz-testcase-4613647767961600 
00000000: 2232 3101 0000 0000 0000 0037 2222       "21........7""


Yeah. The input has a NUL byte, so the string is considered terminated.
Project Member

Comment 11 by ClusterFuzz, Apr 18 2017

ClusterFuzz has detected this issue as fixed in range 464996:465037.

Detailed report: https://clusterfuzz.com/testcase?key=4613647767961600

Fuzzer: libfuzzer_base_json_correctness_fuzzer
Job Type: libfuzzer_chrome_asan
Platform Id: linux

Crash Type: ASSERT
Crash Address: 
Crash State:
  parsed_output == double_parsed_output. Parser/Writer mismatch.
  
Sanitizer: address (ASAN)

Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_asan&range=428777:428862
Fixed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_asan&range=464996:465037

Reproducer Testcase: https://clusterfuzz.com/download/AMIfv950YlPRyBvOuaArcDKYnplMZL2v0P_2rgFZEdTHRkn2p5UUYIbRc0nPJSkcNY76SsW-ZgP6z2_Zt5MgKH2353wv-XuqONUwle3d97fU89p3xAz90SucjDPj7Da5Gft-c-dtyfRNcPTWLIy0R6mE6N-QSYB4VVJhGiKLWlkhijM-O7GXGNQH8Wptrz_Qt42hBKACtMYQpnn8mVPD-_9mGreDxypFSkB0hWmNJhU2GsQYc4K7TUNZXzJ1ICvMHLAdNEMnUNfxWV6eIVClA831xcQeGSmSR4Fw-IYaaH3RH8HS8Naj8Cj89ie87bdlEKD2WZohFSDcDAa_fmR6EFvRW_jtZfnPuoZC62h7rL_gI8gjsd7yK2M?testcase_id=4613647767961600


See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 12 by sheriffbot@chromium.org, Jul 13 2017

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment