Issue metadata
Sign in to add a comment
|
ASSERTION FAILED: m_scriptToProcess |
||||||||||||||||||||||||
Issue descriptionDetailed report: https://cluster-fuzz.appspot.com/testcase?key=5029998846541824 Fuzzer: inferno_layout_test_unmodified Job Type: linux_debug_content_shell_drt Platform Id: linux Crash Type: ASSERT Crash Address: Crash State: ASSERTION FAILED: m_scriptToProcess blink::HTMLTreeBuilder::takeScriptToProcess blink::HTMLDocumentParser::runScriptsForPausedTreeBuilder Minimized Testcase (0.48 Kb): Download: https://cluster-fuzz.appspot.com/download/AMIfv96MuLVjZ3I9vD1VI-AWdDONqx2ZH9dHKnkZhenp3Dlg81eMX5LqKdRVv1AsV-uUvApRHRcahO3GmcMZqBFLMbeyWi0_zbXUiZtOx-Eccz2m4YEp_SSLScjfXH5oVeRVD2dIw6vHQvebdXZHp-3r9jOf9DXIJQ <style> @import url(N#Va_=l|3M&</style> <script> function eventhandler8() { /*Document*/ var var00102 = document; //line 111 /*Node*/ var var00103 = var00102; //line 112 /*HTMLDocument*/ var var00267 = document; //line 303 /*XMLSerializer*/ var var00268 = new XMLSerializer(); //line 304 /*DOMString*/ var var00269 = var00268.serializeToString(var00103); //line 305 var00267.writeln(var00269); //line 306 } </script> <style onload="eventhandler8()"></style> <iframe> Filer: ajha See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
Jun 27 2016
This looks like a dup of one I'm working on.
,
Jun 27 2016
ClusterFuzz has detected this issue as fixed in range 402095:402107. Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5029998846541824 Fuzzer: inferno_layout_test_unmodified Job Type: linux_debug_content_shell_drt Platform Id: linux Crash Type: ASSERT Crash Address: Crash State: m_scriptToProcess blink::HTMLTreeBuilder::takeScriptToProcess blink::HTMLDocumentParser::runScriptsForPausedTreeBuilder Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_debug_content_shell_drt&range=402095:402107 Minimized Testcase (0.48 Kb): Download: https://cluster-fuzz.appspot.com/download/AMIfv9765648feTcigxe-DoG6bKoMvyCn55dTjTGRLGRwigGir2bx3v96C_QZGwJHwPUGHH3X-vziF7ZC2bXXfr78yMwBtZKUhaMShWpGdfkw_abXzH-Zgq3h-Th0KPFVve0iDKB1GkJV97NeNXTJmAIGvnVdBQ3bg?testcase_id=5029998846541824 <style> @import url(N#Va_=l|3M&</style> <script> function eventhandler8() { /*Document*/ var var00102 = document; //line 111 /*Node*/ var var00103 = var00102; //line 112 /*HTMLDocument*/ var var00267 = document; //line 303 /*XMLSerializer*/ var var00268 = new XMLSerializer(); //line 304 /*DOMString*/ var var00269 = var00268.serializeToString(var00103); //line 305 var00267.writeln(var00269); //line 306 } </script> <style onload="eventhandler8()"></style> <iframe> See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Nov 22 2016
Removing EditIssue view restrictions from ClusterFuzz filed bugs. If you believe that this issue should still be restricted, please reapply the label. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||||
Comment 1 by ajha@chromium.org
, Apr 20 2016Labels: Te-Logged M-50
Owner: keishi@chromium.org
Status: Assigned (was: Available)