Issue metadata
Sign in to add a comment
|
Heap-buffer-overflow in SkReadBuffer::readRect |
||||||||||||||||||||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=6641242044891136 Fuzzer: libFuzzer_paint_op_buffer_fuzzer Job Type: libfuzzer_chrome_asan Platform Id: linux Crash Type: Heap-buffer-overflow READ 16 Crash Address: 0x6040000016bf Crash State: SkReadBuffer::readRect SkTextBlob::MakeFromBuffer SkTextBlob::Deserialize Sanitizer: address (ASAN) Recommended Security Severity: Medium Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_asan&range=514197:514231 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6641242044891136 Issue filed automatically. See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reference.md for more information.
,
Nov 10 2017
,
Nov 11 2017
,
Nov 11 2017
,
Nov 11 2017
This is a serious security regression. If you are not able to fix this quickly, please revert the change that introduced it. If this doesn't affect a release branch, or has not been properly classified for severity, please update the Security_Impact or Security_Severity labels, and remove the ReleaseBlock label. To disable this altogether, apply ReleaseBlock-NA. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Nov 11 2017
,
Nov 12 2017
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/0cfacc551f44e0f9d85ea50c86005ed847b2cc55 commit 0cfacc551f44e0f9d85ea50c86005ed847b2cc55 Author: Vladimir Levin <vmpstr@chromium.org> Date: Sun Nov 12 07:16:58 2017 cc/paint: Validate SkData for text blob deserialization. This patch verifies that the SkData we use to deserialize a text blob looks correct (and will not cause an assert in Skia). R=enne@chromium.org Bug: 783808 , 783815 , 783828 Cq-Include-Trybots: master.tryserver.blink:linux_trusty_blink_rel Change-Id: Ib07666354827a70dd4a95a589c60ab12b5e61ae7 Reviewed-on: https://chromium-review.googlesource.com/764582 Commit-Queue: enne <enne@chromium.org> Reviewed-by: enne <enne@chromium.org> Cr-Commit-Position: refs/heads/master@{#515862} [modify] https://crrev.com/0cfacc551f44e0f9d85ea50c86005ed847b2cc55/cc/paint/paint_op_reader.cc
,
Nov 13 2017
ClusterFuzz has detected this issue as fixed in range 515861:515862. Detailed report: https://clusterfuzz.com/testcase?key=6641242044891136 Fuzzer: libFuzzer_paint_op_buffer_fuzzer Job Type: libfuzzer_chrome_asan Platform Id: linux Crash Type: Heap-buffer-overflow READ 16 Crash Address: 0x6040000016bf Crash State: SkReadBuffer::readRect SkTextBlob::MakeFromBuffer SkTextBlob::Deserialize Sanitizer: address (ASAN) Recommended Security Severity: Medium Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_asan&range=514197:514231 Fixed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_asan&range=515861:515862 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6641242044891136 See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reference.md for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Nov 13 2017
ClusterFuzz testcase 6641242044891136 is verified as fixed, so closing issue as verified. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
Nov 14 2017
,
Nov 27 2017
,
Feb 19 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Mar 27 2018
,
Mar 31 2018
|
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by ClusterFuzz
, Nov 10 2017Owner: vmp...@chromium.org
Status: Assigned (was: Untriaged)