New issue
Advanced search Search tips

Issue 738384 link

Starred by 1 user

Issue metadata

Status: Duplicate
Owner: ----
Closed: Jun 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Windows
Pri: 1
Type: Bug-Security



Sign in to add a comment

Heap-use-after-free in FX_Free

Project Member Reported by ClusterFuzz, Jun 30 2017

Issue description

Detailed report: https://clusterfuzz.com/testcase?key=4616151270424576

Fuzzer: ifratric_pdf_generic
Job Type: windows_syzyasan_chrome
Platform Id: windows

Crash Type: Heap-use-after-free READ 2
Crash Address: 0x2a6013d1
Crash State:
  FX_Free
  CJPX_Decoder::Init
  CCodec_JpxModule::CreateDecoder
  
Memory Tool: SYZYASAN

Recommended Security Severity: High

Regressed: https://clusterfuzz.com/revisions?job=windows_syzyasan_chrome&range=483471:483525

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=4616151270424576


Issue filed automatically.

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
 
Project Member

Comment 1 by sheriffbot@chromium.org, Jun 30 2017

Labels: M-61
Project Member

Comment 2 by sheriffbot@chromium.org, Jun 30 2017

Labels: ReleaseBlock-Stable
This is a serious security regression. If you are not able to fix this quickly, please revert the change that introduced it.

If this doesn't affect a release branch, or has not been properly classified for severity, please update the Security_Impact or Security_Severity labels, and remove the ReleaseBlock label. To disable this altogether, apply ReleaseBlock-NA.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 3 by sheriffbot@chromium.org, Jun 30 2017

Labels: Pri-1
 Issue 738529  has been merged into this issue.
Components: Internals>Plugins>PDF
Cc: thestig@chromium.org
Mergedinto: 737033
Status: Duplicate (was: Untriaged)
Project Member

Comment 8 by ClusterFuzz, Jul 1 2017

ClusterFuzz has detected this issue as fixed in range 483845:483879.

Detailed report: https://clusterfuzz.com/testcase?key=4616151270424576

Fuzzer: ifratric_pdf_generic
Job Type: windows_syzyasan_chrome
Platform Id: windows

Crash Type: Heap-use-after-free READ 2
Crash Address: 0x2a6013d1
Crash State:
  FX_Free
  CJPX_Decoder::Init
  CCodec_JpxModule::CreateDecoder
  
Memory Tool: SYZYASAN

Recommended Security Severity: High

Regressed: https://clusterfuzz.com/revisions?job=windows_syzyasan_chrome&range=483471:483525
Fixed: https://clusterfuzz.com/revisions?job=windows_syzyasan_chrome&range=483845:483879

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=4616151270424576


See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 9 by sheriffbot@chromium.org, Oct 7 2017

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment