Issue metadata
Sign in to add a comment
|
Security: Use after free and out of bounds in libxml2
Reported by
ha...@hboeck.de,
Aug 13 2016
|
||||||||||||||||||||
Issue descriptionVULNERABILITY DETAILS A use after free and an out of bounds read can happen with malformed inputs in libxml2, which is used by Chrome for various use cases. VERSION libxml 2.9.4 and current git REPRODUCTION CASE I'll attach sample files + error reports from Address Sanitizer. Both issues are triggered in the function xmlDictComputeFastKey(). ADDITIONAL INFO I tried to reproduce these issues with an asan-build of chromium and a javascript testcase, yet I was unable to reproduce them for unknown reasons. As libxml is explicitly mentioned on the Chrome Rewards webpage [1] I thought it's reasonable to report these issues. I'll report them in parallel to the libxml2 developers. Bugs found with afl. [1] https://www.google.com/about/appsecurity/chrome-rewards/
,
Apr 19 2017
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||
Comment 1 by och...@chromium.org
, Aug 15 2016Status: Duplicate (was: Unconfirmed)