New issue
Advanced search Search tips

Issue 736584 link

Starred by 1 user

Issue metadata

Status: Fixed
Owner:
Closed: Jun 2017
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 1
Type: Bug



Sign in to add a comment

CHECK failure: mem_size == 0 implies mem_start == nullptr in wasm-module.cc

Project Member Reported by ClusterFuzz, Jun 24 2017

Issue description

Detailed report: https://clusterfuzz.com/testcase?key=5385467557314560

Fuzzer: inferno_js_fuzzer
Job Type: linux_asan_d8_dbg
Platform Id: linux

Crash Type: CHECK failure
Crash Address: 
Crash State:
  mem_size == 0 implies mem_start == nullptr in wasm-module.cc
  v8::internal::wasm::LazyCompilationOrchestrator::CompileFunction
  v8::internal::wasm::LazyCompilationOrchestrator::CompileLazy
  
Sanitizer: address (ASAN)

Regressed: V8: 44043:44044

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5385467557314560


Issue filed automatically.

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
 
Project Member

Comment 1 by sheriffbot@chromium.org, Jun 24 2017

Labels: M-61
Project Member

Comment 2 by sheriffbot@chromium.org, Jun 24 2017

Labels: ReleaseBlock-Stable
This is a serious security regression. If you are not able to fix this quickly, please revert the change that introduced it.

If this doesn't affect a release branch, or has not been properly classified for severity, please update the Security_Impact or Security_Severity labels, and remove the ReleaseBlock label. To disable this altogether, apply ReleaseBlock-NA.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 3 by sheriffbot@chromium.org, Jun 24 2017

Labels: Pri-1

Comment 4 by aarya@google.com, Jun 26 2017

Owner: rossberg@chromium.org
Status: Assigned (was: Untriaged)
Assigning to V8 sheriff for triage. If it does not have security implications, please change to Type-Bug and remove Restrict-View-SecurityTeam
Owner: clemensh@chromium.org
Status: Started (was: Assigned)
https://chromium-review.googlesource.com/c/548635
Labels: -Type-Bug-Security -Restrict-View-SecurityTeam -Security_Impact-Head -Security_Severity-High -ReleaseBlock-Stable Type-Bug
This requires the --wasm-lazy-compilation commend line flag. Hence no security implications.
Project Member

Comment 8 by ClusterFuzz, Jun 27 2017

ClusterFuzz has detected this issue as fixed in range 46217:46218.

Detailed report: https://clusterfuzz.com/testcase?key=5385467557314560

Fuzzer: inferno_js_fuzzer
Job Type: linux_asan_d8_dbg
Platform Id: linux

Crash Type: CHECK failure
Crash Address: 
Crash State:
  mem_size == 0 implies mem_start == nullptr in wasm-module.cc
  v8::internal::wasm::LazyCompilationOrchestrator::CompileFunction
  v8::internal::wasm::LazyCompilationOrchestrator::CompileLazy
  
Sanitizer: address (ASAN)

Regressed: V8: 44043:44044
Fixed: V8: 46217:46218

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5385467557314560


See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Status: Fixed (was: Started)

Sign in to add a comment