Closed
Description
Revision
Build
./tools/build.py --clean --debug --compile-flag=-fsanitize=address
--compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer
--compile-flag=-fno-common --compile-flag=-g
--strip=off --system-allocator=on --logging=on
--error-messages=on --profile=es2015-subset
OS
Linux 4.15.0-58-generic #64-Ubuntu x86_64 GNU/Linux
Test case
var arrb = new ArrayBuffer(13);
var arr = new Uint8Array(arrb, 9);
arr.slice(1);
Backtrace
Run with jerry poc.js
=================================================================
==40977==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf5300f7b at pc 0xf79a68be bp 0xffa46dd8 sp 0xffa469a8
READ of size 3 at 0xf5300f7b thread T0
#0 0xf79a68bd (/usr/lib32/libasan.so.4+0x778bd)
#1 0x5661d6d8 in ecma_builtin_typedarray_prototype_slice /jerryscript/jerry-core/ecma/builtin-objects/typedarray/ecma-builtin-typedarray-prototype.c:1973
#2 0x566141cf in ecma_builtin_typedarray_prototype_dispatch_routine /jerryscript/jerry-core/ecma/builtin-objects/typedarray/ecma-builtin-typedarray-prototype.inc.h:76
#3 0x56612be1 in ecma_builtin_dispatch_routine /jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1025
#4 0x56612e42 in ecma_builtin_dispatch_call /jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1050
#5 0x56634b53 in ecma_op_function_call /jerryscript/jerry-core/ecma/operations/ecma-function-object.c:729
#6 0x566b9bdf in opfunc_call /jerryscript/jerry-core/vm/vm.c:581
#7 0x566ced83 in vm_execute /jerryscript/jerry-core/vm/vm.c:3622
#8 0x566cf632 in vm_run /jerryscript/jerry-core/vm/vm.c:3742
#9 0x566b8a45 in vm_run_global /jerryscript/jerry-core/vm/vm.c:282
#10 0x56583a9b in jerry_run /jerryscript/jerry-core/api/jerry.c:570
#11 0x565803ee in main /jerryscript/jerry-main/main-unix.c:743
#12 0xf776ee80 in __libc_start_main (/lib32/libc.so.6+0x18e80)
#13 0x5657dcc0 (/home/xyz/jerryscript/tmpmaster/jerry+0x15cc0)
0xf5300f7b is located 6 bytes to the right of 37-byte region [0xf5300f50,0xf5300f75)
allocated by thread T0 here:
#0 0xf7a14f34 in malloc (/usr/lib32/libasan.so.4+0xe5f34)
#1 0x56663b51 in jmem_heap_alloc /jerryscript/jerry-core/jmem/jmem-heap.c:258
#2 0x56663bc9 in jmem_heap_gc_and_alloc_block /jerryscript/jerry-core/jmem/jmem-heap.c:293
#3 0x565b2342 in jmem_heap_alloc_block /jerryscript/jerry-core/jmem/jmem-heap.c:327
#4 0x565b2342 in ecma_alloc_extended_object /jerryscript/jerry-core/ecma/base/ecma-alloc.c:109
#5 0x565b2342 in ecma_create_object /jerryscript/jerry-core/ecma/base/ecma-helpers.c:81
#6 0x566239b8 in ecma_arraybuffer_new_object /jerryscript/jerry-core/ecma/operations/ecma-arraybuffer-object.c:49
#7 0x56623f18 in ecma_op_create_arraybuffer_object /jerryscript/jerry-core/ecma/operations/ecma-arraybuffer-object.c:149
#8 0x565d0532 in ecma_builtin_arraybuffer_dispatch_construct /jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-arraybuffer.c:94
#9 0x566130d6 in ecma_builtin_dispatch_construct /jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1084
#10 0x56636152 in ecma_op_function_construct /jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1077
#11 0x566ba1fe in opfunc_construct /jerryscript/jerry-core/vm/vm.c:665
#12 0x566ceda9 in vm_execute /jerryscript/jerry-core/vm/vm.c:3634
#13 0x566cf632 in vm_run /jerryscript/jerry-core/vm/vm.c:3742
#14 0x566b8a45 in vm_run_global /jerryscript/jerry-core/vm/vm.c:282
#15 0x56583a9b in jerry_run /jerryscript/jerry-core/api/jerry.c:570
#16 0x565803ee in main /jerryscript/jerry-main/main-unix.c:743
#17 0xf776ee80 in __libc_start_main (/lib32/libc.so.6+0x18e80)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/usr/lib32/libasan.so.4+0x778bd)
Shadow bytes around the buggy address:
0x3ea60190: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea601a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea601b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea601c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea601d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x3ea601e0: fa fa fa fa fa fa fa fa fa fa 00 00 00 00 05[fa]
0x3ea601f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea60200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea60210: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea60220: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea60230: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==40977==ABORTING