Issue metadata
Sign in to add a comment
|
Use-after-poison in void blink::LocalFrameView::ForAllNonThrottledLocalFrameViews<blink::LocalFrameV |
||||||||||||||||||||||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=6160302382252032 Fuzzer: ochang_domfuzzer Job Type: linux_asan_content_shell_drt Platform Id: linux Crash Type: Use-after-poison READ 8 Crash Address: 0x7ef9c4f6c5e0 Crash State: void blink::LocalFrameView::ForAllNonThrottledLocalFrameViews<blink::LocalFrameV blink::LocalFrameView::UpdateLifecyclePhasesInternal blink::WebAXObject::UpdateLayoutAndCheckValidity Sanitizer: address (ASAN) Recommended Security Severity: High Regressed: https://clusterfuzz.com/revisions?job=linux_asan_content_shell_drt&range=453200:453220 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6160302382252032 Issue filed automatically. See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
Jun 13 2017
,
Jun 13 2017
Tentatively assigning to aleventhal for web_ax_object_proxy expertise; can you please help triage this security bug? Also, it looks like the crash is triggered in a test runner; is it possible that this is not reachable from production code? Thanks!
,
Jun 14 2017
ClusterFuzz has detected this issue as fixed in range 479114:479249. Detailed report: https://clusterfuzz.com/testcase?key=6160302382252032 Fuzzer: ochang_domfuzzer Job Type: linux_asan_content_shell_drt Platform Id: linux Crash Type: Use-after-poison READ 8 Crash Address: 0x7ef9c4f6c5e0 Crash State: void blink::LocalFrameView::ForAllNonThrottledLocalFrameViews<blink::LocalFrameV blink::LocalFrameView::UpdateLifecyclePhasesInternal blink::WebAXObject::UpdateLayoutAndCheckValidity Sanitizer: address (ASAN) Recommended Security Severity: High Regressed: https://clusterfuzz.com/revisions?job=linux_asan_content_shell_drt&range=453200:453220 Fixed: https://clusterfuzz.com/revisions?job=linux_asan_content_shell_drt&range=479114:479249 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6160302382252032 See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Jun 14 2017
ClusterFuzz testcase 6160302382252032 is verified as fixed, so closing issue. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
Jun 14 2017
,
Jun 15 2017
,
Aug 5 2017
,
Aug 5 2017
This bug requires manual review: M61 has already been promoted to the beta branch, so this requires manual review Please contact the milestone owner if you have questions. Owners: amineer@(Android), cmasso@(iOS), ketakid@(ChromeOS), govind@(Desktop) For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Aug 6 2017
+ awhalley@ (Security TPM) for M61 merge review.
,
Aug 8 2017
Fix range is in M61, no need for merge.
,
Sep 5 2017
,
Sep 20 2017
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||||
Comment 1 by sheriffbot@chromium.org
, Jun 13 2017