#include #include #include #include #include #include #include #include #include #include #include #include #include #include #include class DiscardContents: public QPDFObjectHandle::ParserCallbacks { public: ~DiscardContents() override = default; void handleObject(QPDFObjectHandle) override { } void handleEOF() override { } }; class FuzzHelper { public: FuzzHelper(unsigned char const* data, size_t size); void run(); private: std::shared_ptr getQpdf(); void testPages(); void doChecks(); Buffer input_buffer; Pl_Discard discard; }; FuzzHelper::FuzzHelper(unsigned char const* data, size_t size) : // We do not modify data, so it is safe to remove the const for Buffer input_buffer(const_cast(data), size) { } std::shared_ptr FuzzHelper::getQpdf() { auto is = std::shared_ptr(new BufferInputSource("fuzz input", &this->input_buffer)); auto qpdf = QPDF::create(); qpdf->setMaxWarnings(200); qpdf->processInputSource(is); return qpdf; } void FuzzHelper::testPages() { // Parse all content streams, and exercise some helpers that // operate on pages. std::shared_ptr q = getQpdf(); QPDFPageDocumentHelper pdh(*q); QPDFPageLabelDocumentHelper pldh(*q); QPDFOutlineDocumentHelper odh(*q); QPDFAcroFormDocumentHelper afdh(*q); afdh.generateAppearancesIfNeeded(); pdh.flattenAnnotations(); DiscardContents discard_contents; int pageno = 0; for (auto& page: pdh.getAllPages()) { ++pageno; try { page.coalesceContentStreams(); page.parseContents(&discard_contents); page.getImages(); pldh.getLabelForPage(pageno); QPDFObjectHandle page_obj(page.getObjectHandle()); page_obj.getJSON(JSON::LATEST, true).unparse(); odh.getOutlinesForPage(page_obj.getObjGen()); for (auto& aoh: afdh.getWidgetAnnotationsForPage(page)) { afdh.getFieldForAnnotation(aoh); } } catch (QPDFExc& e) { std::cerr << "page " << pageno << ": " << e.what() << std::endl; } } } void FuzzHelper::doChecks() { // Limit the memory used to decompress JPEG files during fuzzing. Excessive memory use during // fuzzing is due to corrupt JPEG data which sometimes cannot be detected before // jpeg_start_decompress is called. During normal use of qpdf very large JPEGs can occasionally // occur legitimately and therefore must be allowed during normal operations. Pl_DCT::setMemoryLimit(100'000'000); Pl_DCT::setScanLimit(50); Pl_PNGFilter::setMemoryLimit(1'000'000); Pl_TIFFPredictor::setMemoryLimit(1'000'000); Pl_Flate::setMemoryLimit(200'000); // Do not decompress corrupt data. This may cause extended runtime within jpeglib without // exercising additional code paths in qpdf, and potentially causing counterproductive timeouts. Pl_DCT::setThrowOnCorruptData(true); // Get as much coverage as possible in parts of the library that // might benefit from fuzzing. std::cerr << "\ninfo: starting testPages\n"; testPages(); } void FuzzHelper::run() { // The goal here is that you should be able to throw anything at // libqpdf and it will respond without any memory errors and never // do anything worse than throwing a QPDFExc or // std::runtime_error. Throwing any other kind of exception, // segfaulting, or having a memory error (when built with // appropriate sanitizers) will all cause abnormal exit. try { doChecks(); } catch (QPDFExc const& e) { std::cerr << "QPDFExc: " << e.what() << std::endl; } catch (std::runtime_error const& e) { std::cerr << "runtime_error: " << e.what() << std::endl; } } extern "C" int LLVMFuzzerTestOneInput(unsigned char const* data, size_t size) { #ifndef _WIN32 // Used by jpeg library to work around false positives in memory // sanitizer. setenv("JSIMD_FORCENONE", "1", 1); #endif FuzzHelper f(data, size); f.run(); return 0; }