New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 784080 link

Starred by 1 user

Issue metadata

Status: Verified
Owner:
Closed: Nov 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 1
Type: Bug-Security



Sign in to add a comment

Crash in v8::internal::Simulator::DecodeType3

Project Member Reported by ClusterFuzz, Nov 11 2017

Issue description

Detailed report: https://clusterfuzz.com/testcase?key=6497963143856128

Fuzzer: decoder_langfuzz
Job Type: linux_asan_d8_v8_arm_dbg
Platform Id: linux

Crash Type: UNKNOWN READ
Crash Address: 0xcbe17ed4
Crash State:
  v8::internal::Simulator::DecodeType3
  v8::internal::Simulator::InstructionDecode
  v8::internal::Simulator::CallInternal
  
Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Regressed: https://clusterfuzz.com/revisions?job=linux_asan_d8_v8_arm_dbg&range=48861:48862

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6497963143856128

Issue filed automatically.

See https://github.com/google/clusterfuzz-tools for more information.
 

Comment 1 by est...@chromium.org, Nov 11 2017

Labels: Security_Impact-Head M-64
Owner: danno@chromium.org
Status: Assigned (was: Untriaged)
danno could you take a look please? Thanks!
Project Member

Comment 2 by sheriffbot@chromium.org, Nov 12 2017

Labels: ReleaseBlock-Stable
This is a serious security regression. If you are not able to fix this quickly, please revert the change that introduced it.

If this doesn't affect a release branch, or has not been properly classified for severity, please update the Security_Impact or Security_Severity labels, and remove the ReleaseBlock label. To disable this altogether, apply ReleaseBlock-NA.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 3 by sheriffbot@chromium.org, Nov 12 2017

Labels: Pri-1

Comment 4 by danno@chromium.org, Nov 21 2017

Status: Started (was: Assigned)
Project Member

Comment 5 by bugdroid1@chromium.org, Nov 22 2017

The following revision refers to this bug:
  https://chromium.googlesource.com/v8/v8.git/+/4d70aa02fdcc2426222d06b333f6b13a4101e28f

commit 4d70aa02fdcc2426222d06b333f6b13a4101e28f
Author: Daniel Clifford <danno@chromium.org>
Date: Wed Nov 22 12:32:37 2017

Fix hole handling in fast arguments slice

Bug:  chromium:784080 
Change-Id: I38c539435d867f6abb80218457e5b5a982e34817
Reviewed-on: https://chromium-review.googlesource.com/785210
Reviewed-by: Igor Sheludko <ishell@chromium.org>
Commit-Queue: Daniel Clifford <danno@chromium.org>
Cr-Commit-Position: refs/heads/master@{#49571}
[modify] https://crrev.com/4d70aa02fdcc2426222d06b333f6b13a4101e28f/src/builtins/builtins-array-gen.cc
[add] https://crrev.com/4d70aa02fdcc2426222d06b333f6b13a4101e28f/test/mjsunit/regress/regress-784080.js

Project Member

Comment 6 by ClusterFuzz, Nov 22 2017

ClusterFuzz has detected this issue as fixed in range 49570:49571.

Detailed report: https://clusterfuzz.com/testcase?key=6497963143856128

Fuzzer: decoder_langfuzz
Job Type: linux_asan_d8_v8_arm_dbg
Platform Id: linux

Crash Type: UNKNOWN READ
Crash Address: 0xcbe17ed4
Crash State:
  v8::internal::Simulator::DecodeType3
  v8::internal::Simulator::InstructionDecode
  v8::internal::Simulator::CallInternal
  
Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Regressed: https://clusterfuzz.com/revisions?job=linux_asan_d8_v8_arm_dbg&range=48861:48862
Fixed: https://clusterfuzz.com/revisions?job=linux_asan_d8_v8_arm_dbg&range=49570:49571

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6497963143856128

See https://github.com/google/clusterfuzz-tools for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 7 by ClusterFuzz, Nov 22 2017

Labels: ClusterFuzz-Verified
Status: Verified (was: Started)
ClusterFuzz testcase 6497963143856128 is verified as fixed, so closing issue as verified.

If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
Project Member

Comment 8 by sheriffbot@chromium.org, Nov 23 2017

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify
Labels: -reward-topanel reward-unpaid reward-1500
*** Boilerplate reminders! ***
Please do NOT publicly disclose details until a fix has been released to all our users. Early public disclosure may cancel the provisional reward. Also, please be considerate about disclosure when the bug affects a core library that may be used by other products. Please do NOT share this information with third parties who are not directly involved in fixing the bug. Doing so may cancel the provisional reward. Please be honest if you have already disclosed anything publicly or to third parties. Lastly, we understand that some of you are not interested in money. We offer the option to donate your reward to an eligible charity. If you prefer this option, let us know and we will also match your donation - subject to our discretion. Any rewards that are unclaimed after 12 months will be donated to a charity of our choosing.
*********************************
Hi decoder.oh@ - the VRP Panel decided to award $1000 for this, plus the $500 clusterfuzz bonus.  Thanks!
Labels: -reward-unpaid reward-inprocess
Project Member

Comment 12 by sheriffbot@chromium.org, Mar 1 2018

Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 13 by sheriffbot@chromium.org, Mar 27 2018

Labels: -Security_Impact-Head -M-64 M-65 Security_Impact-Stable
Labels: -ReleaseBlock-Stable

Sign in to add a comment