New issue
Advanced search Search tips

Issue 795489 link

Starred by 1 user

Issue metadata

Status: Duplicate
Merged: issue 795131
Owner:
Closed: Dec 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 1
Type: Bug-Security



Sign in to add a comment

Use-of-uninitialized-value in v8::internal::wasm::CallIndirectOperand<

Project Member Reported by ClusterFuzz, Dec 16 2017

Issue description

Detailed report: https://clusterfuzz.com/testcase?key=4677507399024640

Fuzzer: libFuzzer_v8_wasm_async_fuzzer
Job Type: libfuzzer_chrome_msan
Platform Id: linux

Crash Type: Use-of-uninitialized-value
Crash Address: 
Crash State:
  v8::internal::wasm::CallIndirectOperand<
  v8::internal::wasm::WasmFullDecoder<
  v8::internal::wasm::WasmFullDecoder<
  
Sanitizer: memory (MSAN)

Recommended Security Severity: Medium

Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_msan&range=524044:524066

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=4677507399024640

Issue filed automatically.

See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reference.md for more information.
 
Project Member

Comment 1 by ClusterFuzz, Dec 16 2017

Components: Blink>JavaScript>WebAssembly
Labels: Test-Predator-Auto-Components
Automatically applying components based on crash stacktrace and information from OWNERS files.

If this is incorrect, please apply the Test-Predator-Wrong-Components label.
Project Member

Comment 2 by sheriffbot@chromium.org, Dec 16 2017

Labels: M-65
Project Member

Comment 3 by sheriffbot@chromium.org, Dec 16 2017

Labels: ReleaseBlock-Stable
This is a serious security regression. If you are not able to fix this quickly, please revert the change that introduced it.

If this doesn't affect a release branch, or has not been properly classified for severity, please update the Security_Impact or Security_Severity labels, and remove the ReleaseBlock label. To disable this altogether, apply ReleaseBlock-NA.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 4 by sheriffbot@chromium.org, Dec 16 2017

Labels: Pri-1

Comment 5 by cthomp@chromium.org, Dec 18 2017

Owner: clemensh@chromium.org
clemensh@ Could you take a look at this, or help find an owner? Clusterfuzz indicates it may be caused by changes in crrev.com/822476/ or related CLs.
Project Member

Comment 6 by sheriffbot@chromium.org, Dec 18 2017

Status: Assigned (was: Untriaged)
Mergedinto: 795131
Status: Duplicate (was: Assigned)
Project Member

Comment 8 by ClusterFuzz, Dec 20 2017

ClusterFuzz has detected this issue as fixed in range 525188:525196.

Detailed report: https://clusterfuzz.com/testcase?key=4677507399024640

Fuzzer: libFuzzer_v8_wasm_async_fuzzer
Job Type: libfuzzer_chrome_msan
Platform Id: linux

Crash Type: Use-of-uninitialized-value
Crash Address: 
Crash State:
  v8::internal::wasm::CallIndirectOperand<
  v8::internal::wasm::WasmFullDecoder<
  v8::internal::wasm::WasmFullDecoder<
  
Sanitizer: memory (MSAN)

Recommended Security Severity: Medium

Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_msan&range=524044:524066
Fixed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_msan&range=525188:525196

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=4677507399024640

See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reference.md for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 9 by sheriffbot@chromium.org, Mar 27 2018

Labels: -Security_Impact-Head Security_Impact-Stable
Project Member

Comment 10 by sheriffbot@chromium.org, Mar 29 2018

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment