New issue
Advanced search Search tips

Issue 706349 link

Starred by 1 user

Issue metadata

Status: Fixed
Owner:
Closed: Apr 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 1
Type: Bug-Security



Sign in to add a comment

CrOS: Vulnerability reported in media-libs/tiff

Project Member Reported by vomit.go...@appspot.gserviceaccount.com, Mar 29 2017

Issue description

Automated analysis has detected that the following third party packages have had vulnerabilities publicly reported. 

NOTE: There may be several bugs listed below - in almost all cases, all bugs can be quickly addressed by upgrading to the latest version of the package.

Package Name: media-libs/tiff
Package Version: [cpe:/a:libtiff:libtiff:4.0.6 cpe:/a:libtiff:libtiff:4.0.7 cpe:/a:libtiff_project:libtiff:4.0.6 cpe:/a:libtiff_project:libtiff:4.0.7]

Advisory: CVE-2016-10266
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-10266
  CVSS severity score: 4.3/10.0
  Confidence: high
  Description:

LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_read.c:351:22.
Advisory: CVE-2016-10267
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-10267
  CVSS severity score: 4.3/10.0
  Confidence: high
  Description:

LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.
Advisory: CVE-2016-10268
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-10268
  CVSS severity score: 6.8/10.0
  Confidence: high
  Description:

tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 78490" and libtiff/tif_unix.c:115:23.
Advisory: CVE-2016-10269
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-10269
  CVSS severity score: 6.8/10.0
  Confidence: high
  Description:

LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 512" and libtiff/tif_unix.c:340:2.
Advisory: CVE-2016-10270
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-10270
  CVSS severity score: 6.8/10.0
  Confidence: high
  Description:

LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 8" and libtiff/tif_read.c:523:22.
Advisory: CVE-2016-10271
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-10271
  CVSS severity score: 6.8/10.0
  Confidence: high
  Description:

tools/tiffcrop.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read and buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 1" and libtiff/tif_fax3.c:413:13.
Advisory: CVE-2016-10272
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-10272
  CVSS severity score: 6.8/10.0
  Confidence: high
  Description:

LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "WRITE of size 2048" and libtiff/tif_next.c:64:9.


 

Comment 1 by ta...@google.com, Mar 30 2017

Components: Internals>Plugins>PDF
Labels: Security_Severity-Medium Security_Impact-Stable
Owner: vapier@chromium.org
Status: Assigned (was: Untriaged)
vapier@, would be an appropriate person to take this? If not, I wonder if you can re-assign to the right person. Thank you!
Cc: npm@chromium.org
What does ChromeOS use libtiff for anyway?

It is also used in PDFium, but only with XFA which is not enabled by default. We can certainly apply the same patches if we haven't already. See also  bug 703757 .
These look completely separate from the fixes in  bug 703757 .
Project Member

Comment 4 by sheriffbot@chromium.org, Mar 30 2017

Labels: M-58
Project Member

Comment 5 by sheriffbot@chromium.org, Mar 30 2017

Labels: -Pri-2 Pri-1

Comment 6 by npm@chromium.org, Mar 30 2017

I'll apply the patches on the PDFium side.
Project Member

Comment 7 by bugdroid1@chromium.org, Mar 30 2017

The following revision refers to this bug:
  https://pdfium.googlesource.com/pdfium/+/1c5e98c6fdd664eda5e6d04835e55125a2117970

commit 1c5e98c6fdd664eda5e6d04835e55125a2117970
Author: Nicolas Pena <npm@chromium.org>
Date: Thu Mar 30 18:54:58 2017

Libtiff security upstream patches

CL list:
https://github.com/vadz/libtiff/commit/438274f938e046d33cb0e1230b41da32ffe223e1
https://github.com/vadz/libtiff/commit/43bc256d8ae44b92d2734a3c5bc73957a4d7c1ec
https://github.com/vadz/libtiff/commit/1044b43637fa7f70fb19b93593777b78bd20da86
https://github.com/vadz/libtiff/commit/9a72a69e035ee70ff5c41541c8c61cd97990d018
https://github.com/vadz/libtiff/commit/b4b41925115059b49f97432bda0613411df2f686

Bug:  chromium:706349 
Change-Id: I782156e7486919a62e25eeb95cb8699f1b2c5ee1
Reviewed-on: https://pdfium-review.googlesource.com/3374
Reviewed-by: dsinclair <dsinclair@chromium.org>
Reviewed-by: Lei Zhang <thestig@chromium.org>
Commit-Queue: Nicolás Peña <npm@chromium.org>

[modify] https://crrev.com/1c5e98c6fdd664eda5e6d04835e55125a2117970/third_party/libtiff/tif_strip.c
[modify] https://crrev.com/1c5e98c6fdd664eda5e6d04835e55125a2117970/third_party/libtiff/tif_dir.c
[modify] https://crrev.com/1c5e98c6fdd664eda5e6d04835e55125a2117970/third_party/libtiff/tif_ojpeg.c
[modify] https://crrev.com/1c5e98c6fdd664eda5e6d04835e55125a2117970/third_party/libtiff/tif_dirread.c
[modify] https://crrev.com/1c5e98c6fdd664eda5e6d04835e55125a2117970/third_party/libtiff/tif_read.c
[modify] https://crrev.com/1c5e98c6fdd664eda5e6d04835e55125a2117970/third_party/libtiff/README.pdfium
[modify] https://crrev.com/1c5e98c6fdd664eda5e6d04835e55125a2117970/third_party/libtiff/tiffiop.h
[modify] https://crrev.com/1c5e98c6fdd664eda5e6d04835e55125a2117970/third_party/libtiff/tif_pixarlog.c
[add] https://crrev.com/1c5e98c6fdd664eda5e6d04835e55125a2117970/third_party/libtiff/0020-upstream-security-fixes.patch
[modify] https://crrev.com/1c5e98c6fdd664eda5e6d04835e55125a2117970/third_party/libtiff/tif_luv.c

Comment 8 by npm@chromium.org, Mar 30 2017

PDFium updated. Some were not applicable as the we don't have tools/ files. I also included one patch not listed above but included in the blog post:
https://github.com/vadz/libtiff/commit/b4b41925115059b49f97432bda0613411df2f686

Comment 9 by vapier@chromium.org, Mar 30 2017

ignoring test/dev image usage, tiff is used by the scanner logic.  i think we've disabled it in the printing code paths.

considering a bunch of those security fixes have been in upstream for a few months, i'm a bit surprised they haven't done a 4.0.8 release.  with my luck, after i finish adding them to Gentoo, they will roll a new release ;).
Project Member

Comment 10 by bugdroid1@chromium.org, Apr 12 2017

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/overlays/portage-stable/+/8facc367500c0b8a2a7140b7fe2750adc9799c4e

commit 8facc367500c0b8a2a7140b7fe2750adc9799c4e
Author: Mike Frysinger <vapier@chromium.org>
Date: Wed Apr 12 06:26:07 2017

media-libs/tiff: pull in upstream security fixes

Pulled from Gentoo which pulled from upstream tiff.

BUG= chromium:706349 
TEST=precq passes

Change-Id: I54083d2061ac14c9f77bd71ffea99703ebf36da3
Reviewed-on: https://chromium-review.googlesource.com/473848
Commit-Ready: Mike Frysinger <vapier@chromium.org>
Tested-by: Mike Frysinger <vapier@chromium.org>
Reviewed-by: Jorge Lucangeli Obes <jorgelo@chromium.org>

[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2659.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2130.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2659-2.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2665.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2608.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2620.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2658.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-hylafax-hack.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2635.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2535.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2638.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2607.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2651.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-fax2tiff.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2605.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2648.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2610.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2642-bug2643-bug2646-bug2647.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2631.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2633-bug2634.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2604.patch
[delete] https://crrev.com/d32b2529b55502f0c24a05999e4833e9b0aa90d3/media-libs/tiff/tiff-4.0.7.ebuild
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2621.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-CVE-2017-5225.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2619.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2597.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-CVE-2016-10267.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2639.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2640.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-CVE-2016-10266.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/tiff-4.0.7-r1.ebuild
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2599.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2653.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2627.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2594.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2644.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2650.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2650-2.patch
[add] https://crrev.com/8facc367500c0b8a2a7140b7fe2750adc9799c4e/media-libs/tiff/files/tiff-4.0.7-bug2598.patch

Project Member

Comment 11 by sheriffbot@chromium.org, Apr 14 2017

vapier: Uh oh! This issue still open and hasn't been updated in the last 14 days. This is a serious vulnerability, and we want to ensure that there's progress. Could you please leave an update with the current status and any potential blockers?

If you're not the right owner for this issue, could you please remove yourself as soon as possible or help us find the right one?

If the issue is fixed or you can't reproduce it, please close the bug. If you've started working on a fix, please set the status to Started.

Thanks for your time! To disable nags, add the Disable-Nags label.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Labels: Merge-Request-58
while there are a lot of patches, it shouldn't be too high of a risk since it's only used by the scanning code paths
Project Member

Comment 13 by sheriffbot@chromium.org, Apr 14 2017

Labels: -Merge-Request-58 Merge-Review-58 Hotlist-Merge-Review
This bug requires manual review: We are only 10 days from stable.
Please contact the milestone owner if you have questions.
Owners: amineer@(Android), cmasso@(iOS), bhthompson@(ChromeOS), govind@(Desktop)

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Labels: -Hotlist-Merge-Review -Merge-Review-58 Merge-Approved-58
Project Member

Comment 15 by bugdroid1@chromium.org, Apr 15 2017

Labels: merge-merged-release-R58-9334.B
The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/overlays/portage-stable/+/82843ccabeb8ef45311c34ef5786aa73aa8b3da6

commit 82843ccabeb8ef45311c34ef5786aa73aa8b3da6
Author: Mike Frysinger <vapier@chromium.org>
Date: Sat Apr 15 03:43:15 2017

media-libs/tiff: pull in upstream security fixes

Pulled from Gentoo which pulled from upstream tiff.

BUG= chromium:706349 
TEST=precq passes

Change-Id: I54083d2061ac14c9f77bd71ffea99703ebf36da3
Previously-Reviewed-on: https://chromium-review.googlesource.com/473848
(cherry picked from commit 8facc367500c0b8a2a7140b7fe2750adc9799c4e)
Reviewed-on: https://chromium-review.googlesource.com/478612
Reviewed-by: Jorge Lucangeli Obes <jorgelo@chromium.org>
Commit-Queue: Mike Frysinger <vapier@chromium.org>
Tested-by: Mike Frysinger <vapier@chromium.org>

[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2659.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2130.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2659-2.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2665.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2608.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2620.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2658.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-hylafax-hack.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2635.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2535.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2638.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2607.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2651.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-fax2tiff.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2605.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2648.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2610.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2642-bug2643-bug2646-bug2647.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2631.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2633-bug2634.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2604.patch
[delete] https://crrev.com/e17d941f08e87fe1de6af6abc7338fda9c0c3bb9/media-libs/tiff/tiff-4.0.7.ebuild
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2621.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-CVE-2017-5225.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2619.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2597.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-CVE-2016-10267.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2639.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2640.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-CVE-2016-10266.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/tiff-4.0.7-r1.ebuild
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2599.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2653.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2627.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2594.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2644.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2650.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2650-2.patch
[add] https://crrev.com/82843ccabeb8ef45311c34ef5786aa73aa8b3da6/media-libs/tiff/files/tiff-4.0.7-bug2598.patch

Status: Fixed (was: Assigned)
Project Member

Comment 17 by sheriffbot@chromium.org, Apr 15 2017

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify
Project Member

Comment 18 by sheriffbot@chromium.org, Apr 18 2017

This issue has been approved for a merge. Please merge the fix to any appropriate branches as soon as possible!

If all merges have been completed, please remove any remaining Merge-Approved labels from this issue.

Thanks for your time! To disable nags, add the Disable-Nags label.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Labels: -Merge-Approved-58 Merge-Merged
Project Member

Comment 20 by sheriffbot@chromium.org, Jul 22 2017

Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Comment 21 by dchan@chromium.org, Jan 22 2018

Status: Archived (was: Fixed)
Status: Fixed (was: Archived)

Sign in to add a comment