New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 681423 link

Starred by 1 user

Issue metadata

Status: Verified
Owner:
Last visit > 30 days ago
Closed: Jan 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 1
Type: Bug-Security



Sign in to add a comment

Heap-use-after-free in blink::LayoutBlockFlow::moveAllChildrenIncludingFloatsTo

Project Member Reported by ClusterFuzz, Jan 15 2017

Issue description

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6533935229304832

Fuzzer: ochang_domfuzzer
Job Type: linux_asan_chrome_v8_arm
Platform Id: linux

Crash Type: Heap-use-after-free READ 4
Crash Address: 0xb71283a4
Crash State:
  blink::LayoutBlockFlow::moveAllChildrenIncludingFloatsTo
  blink::LayoutBlockFlow::mergeSiblingContiguousAnonymousBlock
  blink::LayoutBlockFlow::removeChild
  
Sanitizer: address (ASAN)

Recommended Security Severity: High

Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_v8_arm&range=424153:424926

Minimized Testcase (0.40 Kb):
Download: https://cluster-fuzz.appspot.com/download/AMIfv97eqnlxgrYFdFDvTgVP_k8AyKn6B3pnKPpitGE84m19OApwfwjKxmrHkltCrPBv0V4J68UzH17xccK8BVvRp5-tn11PZjD8Yuk-ooueS3XQ_BEmAM4wmc0w_kBtHWv0B5SWFphVfLaAaJwYzaP5devHhHRFrExYE51t80Stozt4bRmyNCRpNad3xXkllQWqJ7tO4IzotiZTN8QbIVOwzZCgSfrX30gQaiYNotEAtVqL9QAnpVK7jaP7zOBS1tGMw3KjpMyNWHt6tjqpO2jj6xYGD1tLYrWzC0sLeldjYLRsescgjAZ4azFeQc-8NAO1632opcF3rAcmQwLQft-3kF-tBsN_WC3k-biT4MpV97LgxHcG-Xk?testcase_id=6533935229304832
<style>
.CLASS1{clip:rect(144ex);display:list-item;}
.CLASS13{padding-top:136%;float:right;</style>
<script>
function fuzz() {
document.designMode = 'on';
  document.execCommand("selectAll");
  document.execCommand("Strikethrough");
  document.execCommand("strikethrough");
}
 setTimeout(fuzz); </script><ruby>
<rt>
<rtc <a class="CLASS1" id="dom-fuzz-18590003">
<input <="" textarea="" class="CLASS9 CLASS13">


Issue filed automatically.

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
 
Project Member

Comment 1 by sheriffbot@chromium.org, Jan 16 2017

Labels: M-57
Project Member

Comment 2 by sheriffbot@chromium.org, Jan 16 2017

Labels: ReleaseBlock-Beta
This issue is a security regression. If you are not able to fix this quickly, please revert the change that introduced it.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 3 by sheriffbot@chromium.org, Jan 16 2017

Labels: Pri-1
Cc: e...@chromium.org
Components: Blink>Layout
Owner: robho...@gmail.com
Status: Assigned (was: Untriaged)
robhogan: might be another one for you to look at here.
Project Member

Comment 5 by sheriffbot@chromium.org, Jan 17 2017

Labels: ReleaseBlock-Beta
This issue is a security regression. If you are not able to fix this quickly, please revert the change that introduced it.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Comment 6 by e...@chromium.org, Jan 17 2017

Do you have time to look into this in the near term robhogan or should we try to find someone else to investigate it?

Comment 7 by robho...@gmail.com, Jan 17 2017

Yes, I can take it.
Project Member

Comment 9 by ClusterFuzz, Jan 20 2017

ClusterFuzz has detected this issue as fixed in range 444763:444844.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6533935229304832

Fuzzer: ochang_domfuzzer
Job Type: linux_asan_chrome_v8_arm
Platform Id: linux

Crash Type: Heap-use-after-free READ 4
Crash Address: 0xb71283a4
Crash State:
  blink::LayoutBlockFlow::moveAllChildrenIncludingFloatsTo
  blink::LayoutBlockFlow::mergeSiblingContiguousAnonymousBlock
  blink::LayoutBlockFlow::removeChild
  
Sanitizer: address (ASAN)

Recommended Security Severity: High

Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_v8_arm&range=424153:424926
Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_v8_arm&range=444763:444844

Minimized Testcase (0.40 Kb):
Download: https://cluster-fuzz.appspot.com/download/AMIfv97eqnlxgrYFdFDvTgVP_k8AyKn6B3pnKPpitGE84m19OApwfwjKxmrHkltCrPBv0V4J68UzH17xccK8BVvRp5-tn11PZjD8Yuk-ooueS3XQ_BEmAM4wmc0w_kBtHWv0B5SWFphVfLaAaJwYzaP5devHhHRFrExYE51t80Stozt4bRmyNCRpNad3xXkllQWqJ7tO4IzotiZTN8QbIVOwzZCgSfrX30gQaiYNotEAtVqL9QAnpVK7jaP7zOBS1tGMw3KjpMyNWHt6tjqpO2jj6xYGD1tLYrWzC0sLeldjYLRsescgjAZ4azFeQc-8NAO1632opcF3rAcmQwLQft-3kF-tBsN_WC3k-biT4MpV97LgxHcG-Xk?testcase_id=6533935229304832
<style>
.CLASS1{clip:rect(144ex);display:list-item;}
.CLASS13{padding-top:136%;float:right;</style>
<script>
function fuzz() {
document.designMode = 'on';
  document.execCommand("selectAll");
  document.execCommand("Strikethrough");
  document.execCommand("strikethrough");
}
 setTimeout(fuzz); </script><ruby>
<rt>
<rtc <a class="CLASS1" id="dom-fuzz-18590003">
<input <="" textarea="" class="CLASS9 CLASS13">


See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 10 by ClusterFuzz, Jan 20 2017

Labels: ClusterFuzz-Verified
Status: Verified (was: Assigned)
ClusterFuzz testcase 6533935229304832 is verified as fixed, so closing issue.

If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
Project Member

Comment 11 by sheriffbot@chromium.org, Jan 20 2017

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify
Labels: -ReleaseBlock-Beta
Project Member

Comment 13 by sheriffbot@chromium.org, Apr 28 2017

Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment