New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 851713 link

Starred by 1 user

Issue metadata

Status: Duplicate
Merged: issue 851877
Owner:
Closed: Jun 2018
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 1
Type: Bug-Security



Sign in to add a comment

Crash in MarkBitFromIndex

Project Member Reported by ClusterFuzz, Jun 11 2018

Issue description

Detailed report: https://clusterfuzz.com/testcase?key=6564842249650176

Fuzzer: v8_builtins_generator
Job Type: linux_ubsan_vptr_d8
Platform Id: linux

Crash Type: UNKNOWN READ
Crash Address: 0x268697e013ac
Crash State:
  MarkBitFromIndex
  MarkBitFrom
  MarkBitFrom
  
Sanitizer: undefined (UBSAN)

Recommended Security Severity: Medium

Regressed: https://clusterfuzz.com/revisions?job=linux_ubsan_vptr_d8&range=53640:53641

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6564842249650176

Issue filed automatically.

See https://github.com/google/clusterfuzz-tools for more information.
 
Project Member

Comment 1 by ClusterFuzz, Jun 11 2018

Components: Blink>JavaScript>GC
Labels: Test-Predator-Auto-Components
Automatically applying components based on crash stacktrace and information from OWNERS files.

If this is incorrect, please apply the Test-Predator-Wrong-Components label.
Project Member

Comment 2 by ClusterFuzz, Jun 11 2018

Cc: dinfuehr@google.com
Labels: Test-Predator-Auto-CC
Automatically adding ccs based on suspected regression changelists:

Mark WeakMaps concurrently by dinfuehr@google.com - https://chromium.googlesource.com/v8/v8/+/eb5d449b6051141b83f9281282fc5f9720b1289f

If this is incorrect, please let us know why and apply the Test-Predator-Wrong-CLs label.
Labels: Pri-1
Owner: u...@chromium.org
Status: Assigned (was: Untriaged)

Comment 4 by u...@chromium.org, Jun 12 2018

Mergedinto: 851877
Status: Duplicate (was: Assigned)
Project Member

Comment 5 by ClusterFuzz, Jun 12 2018

ClusterFuzz has detected this issue as fixed in range 53660:53661.

Detailed report: https://clusterfuzz.com/testcase?key=6564842249650176

Fuzzer: v8_builtins_generator
Job Type: linux_ubsan_vptr_d8
Platform Id: linux

Crash Type: UNKNOWN READ
Crash Address: 0x268697e013ac
Crash State:
  MarkBitFromIndex
  MarkBitFrom
  MarkBitFrom
  
Sanitizer: undefined (UBSAN)

Recommended Security Severity: Medium

Regressed: https://clusterfuzz.com/revisions?job=linux_ubsan_vptr_d8&range=53640:53641
Fixed: https://clusterfuzz.com/revisions?job=linux_ubsan_vptr_d8&range=53660:53661

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6564842249650176

See https://github.com/google/clusterfuzz-tools for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 6 by sheriffbot@chromium.org, Sep 18

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment