Issue metadata
Sign in to add a comment
|
Heap-use-after-free in blink::LayoutBlockFlow::moveAllChildrenIncludingFloatsTo |
||||||||||||||||||||||
Issue descriptionDetailed report: https://cluster-fuzz.appspot.com/testcase?key=6533935229304832 Fuzzer: ochang_domfuzzer Job Type: linux_asan_chrome_v8_arm Platform Id: linux Crash Type: Heap-use-after-free READ 4 Crash Address: 0xb71283a4 Crash State: blink::LayoutBlockFlow::moveAllChildrenIncludingFloatsTo blink::LayoutBlockFlow::mergeSiblingContiguousAnonymousBlock blink::LayoutBlockFlow::removeChild Sanitizer: address (ASAN) Recommended Security Severity: High Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_v8_arm&range=424153:424926 Minimized Testcase (0.40 Kb): Download: https://cluster-fuzz.appspot.com/download/AMIfv97eqnlxgrYFdFDvTgVP_k8AyKn6B3pnKPpitGE84m19OApwfwjKxmrHkltCrPBv0V4J68UzH17xccK8BVvRp5-tn11PZjD8Yuk-ooueS3XQ_BEmAM4wmc0w_kBtHWv0B5SWFphVfLaAaJwYzaP5devHhHRFrExYE51t80Stozt4bRmyNCRpNad3xXkllQWqJ7tO4IzotiZTN8QbIVOwzZCgSfrX30gQaiYNotEAtVqL9QAnpVK7jaP7zOBS1tGMw3KjpMyNWHt6tjqpO2jj6xYGD1tLYrWzC0sLeldjYLRsescgjAZ4azFeQc-8NAO1632opcF3rAcmQwLQft-3kF-tBsN_WC3k-biT4MpV97LgxHcG-Xk?testcase_id=6533935229304832 <style> .CLASS1{clip:rect(144ex);display:list-item;} .CLASS13{padding-top:136%;float:right;</style> <script> function fuzz() { document.designMode = 'on'; document.execCommand("selectAll"); document.execCommand("Strikethrough"); document.execCommand("strikethrough"); } setTimeout(fuzz); </script><ruby> <rt> <rtc <a class="CLASS1" id="dom-fuzz-18590003"> <input <="" textarea="" class="CLASS9 CLASS13"> Issue filed automatically. See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
Jan 16 2017
This issue is a security regression. If you are not able to fix this quickly, please revert the change that introduced it. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Jan 16 2017
,
Jan 17 2017
robhogan: might be another one for you to look at here.
,
Jan 17 2017
This issue is a security regression. If you are not able to fix this quickly, please revert the change that introduced it. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Jan 17 2017
Do you have time to look into this in the near term robhogan or should we try to find someone else to investigate it?
,
Jan 17 2017
Yes, I can take it.
,
Jan 19 2017
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/9ee43c961a1cb445684ac814724b43e4e5d645f3 commit 9ee43c961a1cb445684ac814724b43e4e5d645f3 Author: robhogan <robhogan@gmail.com> Date: Thu Jan 19 18:33:44 2017 Don't clear floats when moving just some of the children in a ruby run BUG= 681423 Review-Url: https://codereview.chromium.org/2645473004 Cr-Commit-Position: refs/heads/master@{#444795} [add] https://crrev.com/9ee43c961a1cb445684ac814724b43e4e5d645f3/third_party/WebKit/LayoutTests/fast/block/float/rubybase-children-moved-crash-expected.txt [add] https://crrev.com/9ee43c961a1cb445684ac814724b43e4e5d645f3/third_party/WebKit/LayoutTests/fast/block/float/rubybase-children-moved-crash.html [modify] https://crrev.com/9ee43c961a1cb445684ac814724b43e4e5d645f3/third_party/WebKit/Source/core/layout/LayoutRubyBase.cpp
,
Jan 20 2017
ClusterFuzz has detected this issue as fixed in range 444763:444844. Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6533935229304832 Fuzzer: ochang_domfuzzer Job Type: linux_asan_chrome_v8_arm Platform Id: linux Crash Type: Heap-use-after-free READ 4 Crash Address: 0xb71283a4 Crash State: blink::LayoutBlockFlow::moveAllChildrenIncludingFloatsTo blink::LayoutBlockFlow::mergeSiblingContiguousAnonymousBlock blink::LayoutBlockFlow::removeChild Sanitizer: address (ASAN) Recommended Security Severity: High Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_v8_arm&range=424153:424926 Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_asan_chrome_v8_arm&range=444763:444844 Minimized Testcase (0.40 Kb): Download: https://cluster-fuzz.appspot.com/download/AMIfv97eqnlxgrYFdFDvTgVP_k8AyKn6B3pnKPpitGE84m19OApwfwjKxmrHkltCrPBv0V4J68UzH17xccK8BVvRp5-tn11PZjD8Yuk-ooueS3XQ_BEmAM4wmc0w_kBtHWv0B5SWFphVfLaAaJwYzaP5devHhHRFrExYE51t80Stozt4bRmyNCRpNad3xXkllQWqJ7tO4IzotiZTN8QbIVOwzZCgSfrX30gQaiYNotEAtVqL9QAnpVK7jaP7zOBS1tGMw3KjpMyNWHt6tjqpO2jj6xYGD1tLYrWzC0sLeldjYLRsescgjAZ4azFeQc-8NAO1632opcF3rAcmQwLQft-3kF-tBsN_WC3k-biT4MpV97LgxHcG-Xk?testcase_id=6533935229304832 <style> .CLASS1{clip:rect(144ex);display:list-item;} .CLASS13{padding-top:136%;float:right;</style> <script> function fuzz() { document.designMode = 'on'; document.execCommand("selectAll"); document.execCommand("Strikethrough"); document.execCommand("strikethrough"); } setTimeout(fuzz); </script><ruby> <rt> <rtc <a class="CLASS1" id="dom-fuzz-18590003"> <input <="" textarea="" class="CLASS9 CLASS13"> See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Jan 20 2017
ClusterFuzz testcase 6533935229304832 is verified as fixed, so closing issue. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
Jan 20 2017
,
Jan 27 2017
,
Apr 28 2017
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by sheriffbot@chromium.org
, Jan 16 2017