New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.
Starred by 2 users
Status: Verified
Owner: ----
Closed: Jun 19
Cc:
Type: Bug-Security



Sign in to add a comment
gdal: Stack-buffer-overflow in nc4_get_vara
Project Member Reported by ClusterFuzz-External, Jun 18 Back to list
Detailed report: https://oss-fuzz.com/testcase?key=5770093583663104

Project: gdal
Fuzzer: libFuzzer_gdal_filesystem_fuzzer
Fuzz target binary: gdal_filesystem_fuzzer
Job Type: libfuzzer_asan_gdal
Platform Id: linux

Crash Type: Stack-buffer-overflow READ {*}
Crash Address: 0x7ffa10eb5010
Crash State:
  nc4_get_vara
  nc4_get_vara_tc
  NC_get_vara
  
Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Regressed: https://oss-fuzz.com/revisions?job=libfuzzer_asan_gdal&range=201706051659:201706061657

Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=5770093583663104


Issue filed automatically.

See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for more information.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.

When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you have questions for the OSS-Fuzz team, please file an issue at https://github.com/google/oss-fuzz/issues.
 
Project Member Comment 1 by ClusterFuzz-External, Jun 18
Labels: OS-Linux
Project Member Comment 3 by ClusterFuzz-External, Jun 19
ClusterFuzz has detected this issue as fixed in range 201706180456:201706190457.

Detailed report: https://oss-fuzz.com/testcase?key=5770093583663104

Project: gdal
Fuzzer: libFuzzer_gdal_filesystem_fuzzer
Fuzz target binary: gdal_filesystem_fuzzer
Job Type: libfuzzer_asan_gdal
Platform Id: linux

Crash Type: Stack-buffer-overflow READ {*}
Crash Address: 0x7ffa10eb5010
Crash State:
  nc4_get_vara
  nc4_get_vara_tc
  NC_get_vara
  
Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Regressed: https://oss-fuzz.com/revisions?job=libfuzzer_asan_gdal&range=201706051659:201706061657
Fixed: https://oss-fuzz.com/revisions?job=libfuzzer_asan_gdal&range=201706180456:201706190457

Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=5770093583663104


See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member Comment 4 by ClusterFuzz-External, Jun 19
Labels: ClusterFuzz-Verified
Status: Verified
ClusterFuzz testcase 5770093583663104 is verified as fixed, so closing issue.

If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
Project Member Comment 5 by sheriffbot@chromium.org, Jul 19
Labels: -restrict-view-commit
This bug has been fixed for 30 days. It has been opened to the public.

- Your friendly Sheriffbot
Sign in to add a comment