New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 705385 link

Starred by 1 user

Issue metadata

Status: Verified
Owner:
Closed: May 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 1
Type: Bug-Security



Sign in to add a comment

Heap-buffer-overflow in v8::internal::Simulator::DecodeTypeImmediate

Project Member Reported by ClusterFuzz, Mar 27 2017

Issue description

Detailed report: https://clusterfuzz.com/testcase?key=6274206385045504

Fuzzer: mbarbella_js_mutation
Job Type: linux_asan_d8_v8_mipsel_dbg
Platform Id: linux

Crash Type: Heap-buffer-overflow WRITE 4
Crash Address: 0xdd31c730
Crash State:
  v8::internal::Simulator::DecodeTypeImmediate
  v8::internal::Simulator::InstructionDecode
  v8::internal::Simulator::CallInternal
  
Sanitizer: address (ASAN)

Recommended Security Severity: High

Regressed: V8: 38687:38688

Reproducer Testcase: https://clusterfuzz.com/download/AMIfv96dOyv2MEG8olmlO4CdDx02xXBbN6MYE7XT1zx16JACFpOIlycDUN7j-jFLa0EYQmOvVuyo-wZu9vTBjGlfVA1esbx-Fj6G3OUzDsROHRNvHucien0JLiyx5CzZazj6Ux6755ZGiUMoABYsygQQPYmJie6BmGBB9EfvJ67Hlx7iS6PfLR9oMtDiSbbEJRmWxdACioagyeL5DalrOumB-1z7tAbfiGmt6uSXWwbXnFTpBMRZr6RqcxJGSQ9gKXgSyhrUKPjzxkVnwQZ7Md4PsnlxnHq3AaeiBNpVJyNmR3kqWpeWwEDNnyJ-HQBrmi93bGS8VbRczh20LBA_6fKt1wtKBt0zjeun0_nZwEEBXLJDR-oEZqx7jI58GMTWbFhueTW4dy0cBVHx0oq8kAB4S4Mlw5pqZw?testcase_id=6274206385045504


Issue manually filed by: ishell

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
 

Comment 1 by ishell@chromium.org, Mar 27 2017

Cc: bradnelson@chromium.org
Owner: mstarzinger@chromium.org
Status: Assigned (was: Untriaged)
--validate-asm issue
Project Member

Comment 2 by sheriffbot@chromium.org, Mar 27 2017

Labels: M-59
Project Member

Comment 3 by sheriffbot@chromium.org, Mar 27 2017

Labels: ReleaseBlock-Beta
This issue is a security regression. If you are not able to fix this quickly, please revert the change that introduced it.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 4 by sheriffbot@chromium.org, Mar 27 2017

Labels: Pri-1
Labels: -ReleaseBlock-Beta -Security_Impact-Head Security_Impact-Stable
Project Member

Comment 6 by sheriffbot@chromium.org, Apr 10 2017

mstarzinger: Uh oh! This issue still open and hasn't been updated in the last 14 days. This is a serious vulnerability, and we want to ensure that there's progress. Could you please leave an update with the current status and any potential blockers?

If you're not the right owner for this issue, could you please remove yourself as soon as possible or help us find the right one?

If the issue is fixed or you can't reproduce it, please close the bug. If you've started working on a fix, please set the status to Started.

Thanks for your time! To disable nags, add the Disable-Nags label.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Cc: ishell@chromium.org rossberg@chromium.org
+more V8 sheriffs. Can you please triage this asap?
Cc: hablich@chromium.org
This is an issue only with the "--validate-asm" configuration which is not shipping (neither on stable nor any other channel). The Finch experiment for this configuration has also been scaled down to 0% by now. Work on this feature is ongoing. IMHO this should not be a release blocker.
Labels: -Security_Impact-Stable -Security_Severity-High Security_Severity-Medium Security_Impact-None
Great, thanks! I'll dial down the severity then.
Project Member

Comment 10 by ClusterFuzz, Apr 24 2017

Detailed report: https://clusterfuzz.com/testcase?key=5261996024135680

Fuzzer: mbarbella_js_mutation
Job Type: linux_asan_d8_v8_mipsel_dbg
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 4
Crash Address: 0xde458854
Crash State:
  v8::internal::Simulator::DecodeTypeImmediate
  v8::internal::Simulator::InstructionDecode
  v8::internal::Simulator::CallInternal
  
Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Regressed: V8: 38687:38688

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5261996024135680


See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
Project Member

Comment 11 by ClusterFuzz, May 5 2017

ClusterFuzz has detected this issue as fixed in range 45077:45078.

Detailed report: https://clusterfuzz.com/testcase?key=5261996024135680

Fuzzer: mbarbella_js_mutation
Job Type: linux_asan_d8_v8_mipsel_dbg
Platform Id: linux

Crash Type: Heap-buffer-overflow READ 4
Crash Address: 0xde458854
Crash State:
  v8::internal::Simulator::DecodeTypeImmediate
  v8::internal::Simulator::InstructionDecode
  v8::internal::Simulator::CallInternal
  
Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Regressed: V8: 38687:38688
Fixed: V8: 45077:45078

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5261996024135680


See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 12 by ClusterFuzz, May 5 2017

ClusterFuzz has detected this issue as fixed in range 45077:45078.

Detailed report: https://clusterfuzz.com/testcase?key=6274206385045504

Fuzzer: mbarbella_js_mutation
Job Type: linux_asan_d8_v8_mipsel_dbg
Platform Id: linux

Crash Type: Heap-buffer-overflow WRITE 4
Crash Address: 0xdd31c730
Crash State:
  v8::internal::Simulator::DecodeTypeImmediate
  v8::internal::Simulator::InstructionDecode
  v8::internal::Simulator::CallInternal
  
Sanitizer: address (ASAN)

Recommended Security Severity: High

Regressed: V8: 38687:38688
Fixed: V8: 45077:45078

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6274206385045504


See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 13 by ClusterFuzz, May 5 2017

Labels: ClusterFuzz-Verified
Status: Verified (was: Assigned)
ClusterFuzz testcase 5261996024135680 is verified as fixed, so closing issue.

If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
Yep, has been fixed by switching to new asm.js validator.
Project Member

Comment 15 by sheriffbot@chromium.org, May 5 2017

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify
Project Member

Comment 16 by sheriffbot@chromium.org, Aug 11 2017

Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment