Issue metadata
Sign in to add a comment
|
Global-buffer-overflow in v8::internal::Simulator::DecodeTypeImmediate |
||||||||||||||||||||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=5170849553580032 Fuzzer: decoder_langfuzz Job Type: linux_asan_d8_v8_mipsel_dbg Platform Id: linux Crash Type: Global-buffer-overflow READ 4 Crash Address: 0xf6f28240 Crash State: v8::internal::Simulator::DecodeTypeImmediate v8::internal::Simulator::InstructionDecode v8::internal::Simulator::CallInternal Sanitizer: address (ASAN) Regressed: V8: 44294:44295 Reproducer Testcase: https://clusterfuzz.com/download/AMIfv97se0OkPHm8U_GLx4LAsKpkU3k1rHvlfbeIwfb38c6in_Y1HzK_XRMD8xS9SD0qsFVs9ems8CZe7zH8lmBrf8EAEk3Ha6o2R80ECP3NRthK3z5537R6BwYkfMjQX13US5xgBNccfxnJgDee790YAkCtZvKcUikvBX0Cqfhke8Q1EwYIU68q0Ye8sLmqj23uHslhh7lu5OW_SYp5jCVFNf59HzPaMUbrFV8Or3fglTJoNMD-p3PYi6v-J8hD2AxjRuTHeWVWtmlLhHRLLFWuPZ_hlkp_b105sqmGSGoBcsy5yNvfHN0V0o6ECv9HWbp6l0y9nGHtI66eswXCdcrE90nAjsR2C3S7uuDmneSGrDaF1qIIc6FxVmhBznBIPwMuS8OsM4c7ConbKy-Cos8S5N_KKtKRiA?testcase_id=5170849553580032 Issue manually filed by: ishell See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
Apr 1 2017
mstarzinger@, I wonder if you can take a look at this. It looks similar to 705385.
,
Apr 1 2017
,
Apr 1 2017
This issue is a security regression. If you are not able to fix this quickly, please revert the change that introduced it. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Apr 1 2017
,
Apr 3 2017
This crash occurs 20% of all crash occurrences in ClusterFuzz. It would be great if it is fixed soon. Thank you!
,
Apr 3 2017
,
Apr 4 2017
ClusterFuzz has detected this issue as fixed in range 44342:44343. Detailed report: https://clusterfuzz.com/testcase?key=5170849553580032 Fuzzer: decoder_langfuzz Job Type: linux_asan_d8_v8_mipsel_dbg Platform Id: linux Crash Type: Global-buffer-overflow READ 4 Crash Address: 0xf6f28240 Crash State: v8::internal::Simulator::DecodeTypeImmediate v8::internal::Simulator::InstructionDecode v8::internal::Simulator::CallInternal Sanitizer: address (ASAN) Regressed: V8: 44294:44295 Fixed: V8: 44342:44343 Reproducer Testcase: https://clusterfuzz.com/download/AMIfv97se0OkPHm8U_GLx4LAsKpkU3k1rHvlfbeIwfb38c6in_Y1HzK_XRMD8xS9SD0qsFVs9ems8CZe7zH8lmBrf8EAEk3Ha6o2R80ECP3NRthK3z5537R6BwYkfMjQX13US5xgBNccfxnJgDee790YAkCtZvKcUikvBX0Cqfhke8Q1EwYIU68q0Ye8sLmqj23uHslhh7lu5OW_SYp5jCVFNf59HzPaMUbrFV8Or3fglTJoNMD-p3PYi6v-J8hD2AxjRuTHeWVWtmlLhHRLLFWuPZ_hlkp_b105sqmGSGoBcsy5yNvfHN0V0o6ECv9HWbp6l0y9nGHtI66eswXCdcrE90nAjsR2C3S7uuDmneSGrDaF1qIIc6FxVmhBznBIPwMuS8OsM4c7ConbKy-Cos8S5N_KKtKRiA?testcase_id=5170849553580032 See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Apr 4 2017
ClusterFuzz testcase 5170849553580032 is verified as fixed, so closing issue. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
Apr 4 2017
,
Apr 5 2017
ClusterFuzz regression ranges point to: Breaking CL: https://chromium.googlesource.com/v8/v8/+/cec39ad1ade5b38a7b203e9cc64cca867196f33a Fixing CL: https://chromium.googlesource.com/v8/v8/+/32d4d8e93dda9f8aa069dd5f3f88ba09462ba89d
,
Apr 7 2017
,
Apr 28 2017
,
Apr 28 2017
,
Apr 28 2017
AFAIK this is already on 59. tools/release/mergeinfo.py 32d4d8e93dda9f8aa069dd5f3f88ba09462ba89d Is on Canary: 3062 First V8 branch: 5.9.157 (Might not be the rolled version)
,
Apr 28 2017
,
May 25 2017
,
Jul 11 2017
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by ta...@google.com
, Mar 31 2017