Crash in v8::internal::Heap::Contains |
|||
Issue descriptionDetailed report: https://cluster-fuzz.appspot.com/testcase?key=5887144201814016 Fuzzer: attekett_dom_fuzzer Job Type: linux_asan_chrome_mp Platform Id: linux Crash Type: UNKNOWN READ Crash Address: 0x000000000000 Crash State: v8::internal::Heap::Contains v8::internal::VerifyPointersVisitor::VisitPointers v8::internal::StandardFrame::IterateCompiledFrame Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=420849:420859 Minimized Testcase (0.40 Kb): Download: https://cluster-fuzz.appspot.com/download/AMIfv95mrQlgzp2NaQINtZojbY-J-qqhnJxUt2FPUhhZnLRGm5gAZzpEOOhHzdKNqQBt7K2WJaoegMTKBGGoAbMAOKGfypyNPm4ONIzN5F-2VbJXTfLfsDhYXFtzEHeBP3xrbDO52fF6xSkW_Tb84Mk8voNFh9RvXw?testcase_id=5887144201814016 <script> // ----------------------------------------------------------------------------- // This is required when using the hack to load .swf files using the Phluent var topProtocol = 'http://www.'; var currentAddress = location.href; var domainShort = currentAddress.substring(); window.location.href = topProtocol+domainShort; AC_FL_RunContent = 0; </script> // Minor version of Flash required Issue manually filed by: kavvaru See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
Sep 27 2016
ClusterFuzz has detected this issue as fixed in range 420859:421049. Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5887144201814016 Fuzzer: attekett_dom_fuzzer Job Type: linux_asan_chrome_mp Platform Id: linux Crash Type: UNKNOWN READ Crash Address: 0x000000000000 Crash State: v8::internal::Heap::Contains v8::internal::VerifyPointersVisitor::VisitPointers v8::internal::StandardFrame::IterateCompiledFrame Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=420849:420859 Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_mp&range=420859:421049 Minimized Testcase (0.40 Kb): Download: https://cluster-fuzz.appspot.com/download/AMIfv95mrQlgzp2NaQINtZojbY-J-qqhnJxUt2FPUhhZnLRGm5gAZzpEOOhHzdKNqQBt7K2WJaoegMTKBGGoAbMAOKGfypyNPm4ONIzN5F-2VbJXTfLfsDhYXFtzEHeBP3xrbDO52fF6xSkW_Tb84Mk8voNFh9RvXw?testcase_id=5887144201814016 <script> // ----------------------------------------------------------------------------- // This is required when using the hack to load .swf files using the Phluent var topProtocol = 'http://www.'; var currentAddress = location.href; var domainShort = currentAddress.substring(); window.location.href = topProtocol+domainShort; AC_FL_RunContent = 0; </script> // Minor version of Flash required See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Sep 27 2016
ClusterFuzz testcase is verified as fixed, closing issue. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
Nov 22 2016
Removing EditIssue view restrictions from ClusterFuzz filed bugs. If you believe that this issue should still be restricted, please reapply the label. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||
►
Sign in to add a comment |
|||
Comment 1 by durga.behera@chromium.org
, Sep 27 2016