Issue metadata
Sign in to add a comment
|
Use-after-poison in blink::LocalFrame::DomWindow |
||||||||||||||||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=4532651051712512 Fuzzer: inferno_twister Job Type: windows_asan_chrome_no_sandbox Platform Id: windows Crash Type: Use-after-poison READ 4 Crash Address: 0x27f88d5c Crash State: blink::LocalFrame::DomWindow blink::LocalFrame::GetDocument blink::LocalFrame::SetPrinting Sanitizer: address (ASAN) Recommended Security Severity: High Regressed: https://clusterfuzz.com/revisions?job=windows_asan_chrome_no_sandbox&range=467800:467819 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=4532651051712512 Issue filed automatically. See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
May 3 2017
ClusterFuzz testcase 4532651051712512 is verified as fixed, so closing issue. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
May 3 2017
,
Aug 9 2017
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Jul 28
|
|||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||
Comment 1 by ClusterFuzz
, May 3 2017