Heap-buffer-overflow in v8::internal::wasm::ModuleDecoder::DecodeFunctionBody |
|||||||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=4684758167846912 Fuzzer: inferno_js_fuzzer Job Type: windows_asan_d8 Platform Id: windows Crash Type: Heap-buffer-overflow WRITE 8 Crash Address: 0x0b003794 Crash State: v8::internal::wasm::ModuleDecoder::DecodeFunctionBody v8::internal::wasm::AsyncStreamingProcessor::ProcessFunctionBody v8::internal::wasm::StreamingDecoder::DecodeFunctionBody::Next Sanitizer: address (ASAN) Recommended Security Severity: High Regressed: https://clusterfuzz.com/revisions?job=windows_asan_d8&range=502452:502478 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=4684758167846912 Issue filed automatically. See https://github.com/google/clusterfuzz-tools for more information.
,
Sep 20 2017
,
Sep 20 2017
This is a serious security regression. If you are not able to fix this quickly, please revert the change that introduced it. If this doesn't affect a release branch, or has not been properly classified for severity, please update the Security_Impact or Security_Severity labels, and remove the ReleaseBlock label. To disable this altogether, apply ReleaseBlock-NA. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Sep 20 2017
,
Sep 20 2017
This crash only happens behind a testing flag which is currently off by default. This is not a release blocker.
,
Sep 20 2017
,
Oct 1 2017
Automatically applying components based on information from OWNERS files. If this seems incorrect, please apply the Test-Predator-Wrong-Components label.
,
Oct 1 2017
,
Nov 20 2017
,
Nov 22 2017
ClusterFuzz has detected this issue as fixed in range 49522:49523. Detailed report: https://clusterfuzz.com/testcase?key=4684758167846912 Fuzzer: inferno_js_fuzzer Job Type: windows_asan_d8 Platform Id: windows Crash Type: Heap-buffer-overflow WRITE 8 Crash Address: 0x0a9024d4 Crash State: v8::internal::wasm::ModuleDecoder::DecodeFunctionBody v8::internal::wasm::AsyncStreamingProcessor::ProcessFunctionBody v8::internal::wasm::StreamingDecoder::DecodeFunctionBody::Next Sanitizer: address (ASAN) Recommended Security Severity: High Fixed: https://clusterfuzz.com/revisions?job=windows_asan_d8&range=49522:49523 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=4684758167846912 See https://github.com/google/clusterfuzz-tools for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page. |
|||||||||
►
Sign in to add a comment |
|||||||||
Comment 1 by clemensh@chromium.org
, Sep 20 2017Components: -Blink>JavaScript Blink>JavaScript>WebAssembly
Owner: ahaas@chromium.org
Status: Assigned (was: Untriaged)