Closed Bug 1496794 Opened Last year Closed Last year

AddressSanitizer: attempting double-free on 0x60700068eb20 [@ __interceptor_free] in WorkerCSPEventListener

Categories

(Core :: DOM: Security, defect, critical)

x86_64
Linux
defect
Not set
critical

Tracking

()

RESOLVED DUPLICATE of bug 1493629
Tracking Status
firefox63 --- fixed
firefox64 --- fixed

People

(Reporter: decoder, Unassigned)

References

(Blocks 1 open bug)

Details

(Keywords: crash, regression)

Attachments

(1 file)

The attached crash information was submitted via the ASan Nightly Reporter on mozilla-central-asan-nightly revision 64.0a1-20181004100222-https://hg.mozilla.org/mozilla-central/rev/f87eeba88f1cf3f4d41095f7a58cb518a59f844c.

For detailed crash information, see attachment.
Flags: sec-bounty?
Sounds similar-ish to bug 1493629 (the fix for which wouldn't have been in the 20181004100222 nightly)?
Group: core-security → dom-core-security
Flags: needinfo?(amarchesini)
Yes, it's the same crash. 20181004100222 nightly doesn't have the fix yet, right?
Flags: needinfo?(amarchesini)
Once verified, can we mark this one as a dup of bug 1493629?
Flags: needinfo?(ryanvm)
I don't have a way of verifying that this crash is gone in newer builds. Redirecting to decoder.
Flags: needinfo?(ryanvm) → needinfo?(choller)
It is not possible to verify this, but given the crash signature and build for which it was submitted, it is reasonable to mark this as a duplicate.
Status: NEW → RESOLVED
Closed: Last year
Flags: needinfo?(choller)
Resolution: --- → DUPLICATE
Duplicate of bug: 1493629
Flags: sec-bounty? → sec-bounty-
Group: dom-core-security
You need to log in before you can comment on or make changes to this bug.