#include #include #include #include #include #include #include #include #include #include #include #include #include #include #include class DiscardContents: public QPDFObjectHandle::ParserCallbacks { public: ~DiscardContents() override = default; void handleObject(QPDFObjectHandle) override { } void handleEOF() override { } }; class FuzzHelper { public: FuzzHelper(unsigned char const* data, size_t size); void run(); private: std::shared_ptr getQpdf(); std::shared_ptr getWriter(std::shared_ptr); void doWrite(std::shared_ptr w); void testWrite(); void testPages(); void testOutlines(); void doChecks(); Buffer input_buffer; Pl_Discard discard; }; FuzzHelper::FuzzHelper(unsigned char const* data, size_t size) : // We do not modify data, so it is safe to remove the const for Buffer input_buffer(const_cast(data), size) { } std::shared_ptr FuzzHelper::getQpdf() { auto is = std::shared_ptr(new BufferInputSource("fuzz input", &this->input_buffer)); auto qpdf = QPDF::create(); qpdf->setMaxWarnings(200); qpdf->processInputSource(is); return qpdf; } std::shared_ptr FuzzHelper::getWriter(std::shared_ptr qpdf) { auto w = std::make_shared(*qpdf); w->setOutputPipeline(&this->discard); w->setDecodeLevel(qpdf_dl_all); return w; } void FuzzHelper::doWrite(std::shared_ptr w) { try { w->write(); } catch (QPDFExc const& e) { std::cerr << e.what() << std::endl; } catch (std::runtime_error const& e) { std::cerr << e.what() << std::endl; } } void FuzzHelper::testWrite() { // Write in various ways to exercise QPDFWriter std::shared_ptr q; std::shared_ptr w; q = getQpdf(); w = getWriter(q); w->setDeterministicID(true); w->setQDFMode(true); doWrite(w); q = getQpdf(); w = getWriter(q); w->setStaticID(true); w->setLinearization(true); w->setR6EncryptionParameters("u", "o", true, true, true, true, true, true, qpdf_r3p_full, true); doWrite(w); q = getQpdf(); w = getWriter(q); w->setStaticID(true); w->setObjectStreamMode(qpdf_o_disable); w->setR3EncryptionParametersInsecure( "u", "o", true, true, true, true, true, true, qpdf_r3p_full); doWrite(w); q = getQpdf(); w = getWriter(q); w->setDeterministicID(true); w->setObjectStreamMode(qpdf_o_generate); w->setLinearization(true); doWrite(w); } void FuzzHelper::testPages() { // Parse all content streams, and exercise some helpers that // operate on pages. std::shared_ptr q = getQpdf(); QPDFPageDocumentHelper pdh(*q); QPDFPageLabelDocumentHelper pldh(*q); QPDFOutlineDocumentHelper odh(*q); QPDFAcroFormDocumentHelper afdh(*q); afdh.generateAppearancesIfNeeded(); pdh.flattenAnnotations(); DiscardContents discard_contents; int pageno = 0; for (auto& page: pdh.getAllPages()) { ++pageno; try { page.coalesceContentStreams(); page.parseContents(&discard_contents); page.getImages(); pldh.getLabelForPage(pageno); QPDFObjectHandle page_obj(page.getObjectHandle()); page_obj.getJSON(JSON::LATEST, true).unparse(); odh.getOutlinesForPage(page_obj.getObjGen()); for (auto& aoh: afdh.getWidgetAnnotationsForPage(page)) { afdh.getFieldForAnnotation(aoh); } } catch (QPDFExc& e) { std::cerr << "page " << pageno << ": " << e.what() << std::endl; } } } void FuzzHelper::testOutlines() { std::shared_ptr q = getQpdf(); std::list> queue; QPDFOutlineDocumentHelper odh(*q); queue.push_back(odh.getTopLevelOutlines()); while (!queue.empty()) { for (auto& ol: *(queue.begin())) { ol.getDestPage(); queue.push_back(ol.getKids()); } queue.pop_front(); } } void FuzzHelper::doChecks() { // Limit the memory used to decompress JPEG files during fuzzing. Excessive memory use during // fuzzing is due to corrupt JPEG data which sometimes cannot be detected before // jpeg_start_decompress is called. During normal use of qpdf very large JPEGs can occasionally // occur legitimately and therefore must be allowed during normal operations. Pl_DCT::setMemoryLimit(1'000'000'000); Pl_PNGFilter::setMemoryLimit(1'000'000); Pl_TIFFPredictor::setMemoryLimit(1'000'000); // Do not decompress corrupt data. This may cause extended runtime within jpeglib without // exercising additional code paths in qpdf, and potentially causing counterproductive timeouts. Pl_DCT::setThrowOnCorruptData(true); // Get as much coverage as possible in parts of the library that // might benefit from fuzzing. std::cerr << "\ninfo: starting testWrite\n"; testWrite(); std::cerr << "\ninfo: starting testPages\n"; testPages(); std::cerr << "\ninfo: starting testOutlines\n"; testOutlines(); } void FuzzHelper::run() { // The goal here is that you should be able to throw anything at // libqpdf and it will respond without any memory errors and never // do anything worse than throwing a QPDFExc or // std::runtime_error. Throwing any other kind of exception, // segfaulting, or having a memory error (when built with // appropriate sanitizers) will all cause abnormal exit. try { doChecks(); } catch (QPDFExc const& e) { std::cerr << "QPDFExc: " << e.what() << std::endl; } catch (std::runtime_error const& e) { std::cerr << "runtime_error: " << e.what() << std::endl; } } extern "C" int LLVMFuzzerTestOneInput(unsigned char const* data, size_t size) { #ifndef _WIN32 // Used by jpeg library to work around false positives in memory // sanitizer. setenv("JSIMD_FORCENONE", "1", 1); #endif FuzzHelper f(data, size); f.run(); return 0; }