New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 708225 link

Starred by 1 user

Issue metadata

Status: Fixed
Owner:
Email to this user bounced
Closed: Apr 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Windows , All , Mac
Pri: 2
Type: Bug



Sign in to add a comment

Crash in blink::PagePopupSupplement::from

Project Member Reported by ClusterFuzz, Apr 4 2017

Issue description

Components: Blink>Internals
Labels: Test-Predator-Wrong M-59
Owner: haraken@chromium.org
Status: Assigned (was: Untriaged)
Through code search on file PagePopupSupplement.cpp, suspected CL is 
https://chromium.googlesource.com/chromium/src/+/a7d691668d850776763dc437d808fadfb4b3154d#
haraken@, could you please take a look and help us to find correct owner if it is not related your changes.
Cc: haraken@chromium.org
Owner: sigbjo...@opera.com
Labels: -Pri-1 -OS-Mac OS-All Pri-2
This only happens in test code, not something exposed in production builds; adjusting priority down one level.
Project Member

Comment 4 by ClusterFuzz, Apr 5 2017

Labels: OS-Mac
Status: Fixed (was: Assigned)
Project Member

Comment 7 by ClusterFuzz, Apr 6 2017

Labels: OS-Windows
Project Member

Comment 8 by ClusterFuzz, Apr 9 2017

ClusterFuzz has detected this issue as fixed in range 458746:463137.

Detailed report: https://clusterfuzz.com/testcase?key=5497569125072896

Fuzzer: inferno_twister
Job Type: mac_asan_content_shell
Platform Id: mac

Crash Type: UNKNOWN READ
Crash Address: 0x000000000060
Crash State:
  blink::PagePopupSupplement::from
  blink::pagePopupControllerAttributeGetterCallback
  v8::internal::PropertyCallbackArguments::Call
  
Sanitizer: address (ASAN)

Regressed: https://clusterfuzz.com/revisions?job=mac_asan_content_shell&range=451977:452017
Fixed: https://clusterfuzz.com/revisions?job=mac_asan_content_shell&range=458746:463137

Reproducer Testcase: https://clusterfuzz.com/download/AMIfv97tlE04omXcpCTK5c5d091iEscGEB6MctwsZiflGvDSuLDWlTA2v6CVcpmi_AGiJUFmgmN_Ci1lz-vtA4AzMxIfmS7ogwLpXaeyMOY787Mtp_kn47a_jYdF-Vwdr8R-QHNleisMp9R6aGg10L1nZ-AFg74oMJetzT3daBpjk4-NR92ZcjX-fbI4--0ko9VdZOVbFwld3biT2XeVgMMKMic3MVpT0P8ubqa2wmfDfY5TrYvEpuxd-410dzLpJTanvjvqiHCGrekqeym-HMLAWgfP_-O8o3E_Z0yE1FFauy8lq_DmHyfswn8PMXgXIxFZ-ORqfqPIvVkX92-6N69uOgo9TcnojzMz1LcQybRIkgqrvnfrxPBYkYcElqRe3EjuJZAMp-ZvCs6CLxb2KZHs3-ngH4d5Cw?testcase_id=5497569125072896


See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.

Sign in to add a comment