New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 605470 link

Starred by 0 users

Issue metadata

Status: Fixed
Owner:
Closed: Apr 2016
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 1
Type: Bug-Security



Sign in to add a comment

Crash in v8::internal::Invoke

Project Member Reported by ClusterFuzz, Apr 21 2016

Issue description

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5948163801743360

Fuzzer: decoder_langfuzz
Job Type: linux_asan_d8_ignition_dbg
Platform Id: linux

Crash Type: UNKNOWN WRITE
Crash Address: 0x7ffff8635f58
Crash State:
  v8::internal::Invoke
  v8::internal::Execution::Call
  v8::Script::Run
  
Recommended Security Severity: High

Regressed: V8: r35617:35618

Minimized Testcase (10.12 Kb): https://cluster-fuzz.appspot.com/download/AMIfv96xyORxODQO9Cr0M4BC-NRF7gutg_RqwZxMRzawZr-PHSpdmYFziqCp1TXYnPDSPcItIbEOsYIR0neRsAPE-DxDa_0KFVWF0WLgpv2aGdfnFw9r5iExoR-lFD6IviDPBl2KNGR7CuPB2fnxvbbFKBam6VWE-A

Filer: mstarzinger

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
 
Owner: mstarzinger@chromium.org
Status: Started (was: Available)
Looks like it only affecting the interpreter (which is not yet shipping). Will triage now and drop security labels if limited to interpreter.
This is interpreter only. Regression range points towards ...

https://chromium.googlesource.com/v8/v8/+/623ad7de882019dff10168ef53bd539f01ef5b93

Reproduces as follows ...

$ git checkout 2d454e226a085f32ee6182625c691e98ad8a84f9
$ make -j1000 ia32.debug
$ ./out/ia32.debug/d8 --ignition boom.js
$ cat boom.js

// Flags: --ignition

function function_with_n_params_and_m_args(n, m) {
  test_prefix = 'prefix ';
  test_suffix = ' suffix';
  var source = 'test_prefix + (function f(';
  for (var arg = 0; arg < n ; arg++) {
    if (arg != 0) source += ',';
    source += 'arg' + arg;
  }
  source += ') { return arg' + (n - n % 2) / 2 + '; })(';
  for (var arg = 0; arg < m ; arg++) {
    if (arg != 0) source += ',';
    source += arg;
  }
  source += ') + test_suffix';
  return eval(source);
}

function_with_n_params_and_m_args(-0x8001, 0x7FFF);
Owner: rmcilroy@chromium.org
Status: Assigned (was: Started)
Project Member

Comment 4 by ClusterFuzz, Apr 21 2016

Labels: Pri-1
Status: Started (was: Assigned)

Comment 6 by vakh@chromium.org, Apr 21 2016

Labels: Security_Impact-Head
Applying Security_Impact-Head.
rmcilroy@: Please feel free to remove it if that's incorrect.
This only impacts the interpreter which isn't shipping yet, so I don't think it has a security impact. In any case, I have a fix landing right now.

Comment 8 by aarya@google.com, Apr 22 2016

Cc: mbarbe...@chromium.org
If this functionality is planned to be shipped in near future and this bug helped to knock down that vulnerability, we should still consider it for reward. impact label can be maybe depending on the timeframe.
Project Member

Comment 9 by sheriffbot@chromium.org, Apr 22 2016

Labels: M-52
Project Member

Comment 10 by ClusterFuzz, Apr 23 2016

Labels: ReleaseBlock-Beta
This medium+ severity security issue is a regression on trunk.

Please fix this asap. If you are unable to look into this soon, please revert your change.

- Your friendly ClusterFuzz
Project Member

Comment 11 by ClusterFuzz, Apr 23 2016

ClusterFuzz has detected this issue as fixed in range 35718:35719.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5948163801743360

Fuzzer: decoder_langfuzz
Job Type: linux_asan_d8_ignition_dbg
Platform Id: linux

Crash Type: UNKNOWN WRITE
Crash Address: 0x7ffff8635f58
Crash State:
  v8::internal::Invoke
  v8::internal::Execution::Call
  v8::Script::Run
  
Recommended Security Severity: High

Regressed: V8: r35617:35618
Fixed: V8: r35718:35719

Minimized Testcase (10.12 Kb): https://cluster-fuzz.appspot.com/download/AMIfv96xyORxODQO9Cr0M4BC-NRF7gutg_RqwZxMRzawZr-PHSpdmYFziqCp1TXYnPDSPcItIbEOsYIR0neRsAPE-DxDa_0KFVWF0WLgpv2aGdfnFw9r5iExoR-lFD6IviDPBl2KNGR7CuPB2fnxvbbFKBam6VWE-A

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Status: Fixed (was: Started)
Project Member

Comment 13 by ClusterFuzz, Apr 25 2016

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify Merge-NA
Labels: -reward-topanel reward-unpaid reward-3500
$3,500 for this one!
Labels: -reward-unpaid reward-inprocess
Project Member

Comment 16 by sheriffbot@chromium.org, Aug 1 2016

Labels: -Restrict-View-SecurityNotify
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 17 by sheriffbot@chromium.org, Oct 1 2016

This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 18 by sheriffbot@chromium.org, Oct 2 2016

This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Labels: allpublic

Sign in to add a comment