|
Message-ID: <cc6dbbfbd8654d4899153ece8385bf60@imshyb02.MITRE.ORG> Date: Sat, 26 Nov 2016 17:49:28 -0500 From: <cve-assign@...re.org> To: <gustavo.grieco@...il.com> CC: <cve-assign@...re.org>, <oss-security@...ts.openwall.com> Subject: Re: CVE request: Heap read out-of-bounds parsing a Javascript file with the last revision of JavaScript Core -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > https://bugs.webkit.org/show_bug.cgi?id=164000 > AddressSanitizer: heap-buffer-overflow > READ of size 16 > #0 0x7ffff67f04af in WTF::(anonymous namespace)::lockHashtable() > (/home/g/Work/Code/webkit-master/WebKitBuild/Release/lib/libjavascriptcoregtk-4.0.so.18+0x20cc4af) > #1 0x7ffff67f1b6c in WTF::ParkingLot::parkConditionallyImpl(void > const*, WTF::ScopedLambda<bool ()> const&, WTF::ScopedLambda<void ()> > const&, std::chrono::time_point<std::chrono::_V2::steady_clock, > std::chrono::duration<long, std::ratio<1l, 1000000000l> > >) > (/home/g/Work/Code/webkit-master/WebKitBuild/Release/lib/libjavascriptcoregtk-4.0.so.18+0x20cdb6c) > #2 0x7ffff67cc1cb in std::_Function_handler<void (), > WTF::AutomaticThread::start(WTF::Locker<WTF::LockBase> > const&)::{lambda()#1}>::_M_invoke(std::_Any_data const&) > (/home/g/Work/Code/webkit-master/WebKitBuild/Release/lib/libjavascriptcoregtk-4.0.so.18+0x20a81cb) > After a month, i received no response from the original bug report in the > webkit bug tracker. Additionally, Chrome / Chromium is not affected. Use CVE-2016-9642. Incidentally, the published WebKit policy is apparently "We cannot guarantee a prompt human response to every security bug filed. If you would like immediate feedback on a security issue, or would like to discuss details with members of the WebKit Security Group, please email security@...kit.org and include a link to the relevant Bugzilla bug. Your message will be acknowledged within a week at most." on the https://webkit.org/security-policy/ web page. - -- CVE Assignment Team M/S M300, 202 Burlington Road, Bedford, MA 01730 USA [ A PGP key is available for encrypted communications at http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJYOg/mAAoJEHb/MwWLVhi2ePcQAIxMTNbZW2og6OGm+H3OoNmJ LeLWKqY58w4NkUcrf+Rla3aPkwPTtdWasjy15rO7YfQ4ugzdvBHEPmO052kcYoGj nCVWoSYG/04DLhz14Q3eixqDO2Z5k8dE+Sgi7XWsXG7Z5s4duOTOX6nX2ZvK9FR5 jY5ZHAXltXdc521YzBTDo4KycfOHzLImLajN9PJsGZJugDjgzxvICnHqUjcH2j2r nQjYKlNok4jVnlib6mOgMCv0xGgvRXibJlfNQrMmdFHeJfDAj66AHT0YN73qyRCr dXkHFrmhQHwc1EEtoh2wWYAlOU4vUZwMuNkyknn1IgyQ83jSnMBlmP9y10bKsO79 mQ6Vpu0EaBo54WOhKUv7GOXxMuL4R53LUwfpkA9G8omkIeg8VW0E2uxIYRC6N/2R fwT1Z8r1A6CWtX7lUM5p4beAeExn184vPCRFsmR0WVsZDBe1xEHitDeXYcwlFcvV ZccNRbTFZUhgT4tNOo1a7587F40Nn75lIKLKEU6EZdrBZCor+9PmA1qnccVj7nlG F8SOuX7je0ULwbWmVNqYrZzewDLXge5PJ4Ovlyzo7TPse2MNvUbQtuPBGiI2RbA0 YF+fX8nGoS8kHh1PCFLgHWCOHO85LLdfSAMkE9AynGeMWvtWzLYtZekrWDsZ03bB Dmqbs/1smLo4dEAEGlcj =gYlb -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.