Closed Bug 1904583 Opened 4 months ago Closed 4 months ago

Hit MOZ_CRASH(nsStandardURL::SanityCheck failed) at /netwerk/base/nsStandardURL.cpp:298

Categories

(Core :: Networking, defect, P2)

x86_64
Linux
defect

Tracking

()

RESOLVED DUPLICATE of bug 1904582

People

(Reporter: jkratzer, Assigned: sekim)

References

(Blocks 1 open bug)

Details

(Keywords: testcase, Whiteboard: [necko-triaged])

Attachments

(2 files)

Testcase found while fuzzing mozilla-central rev 653f0dc8442d built with: --enable-address-sanitizer --enable-fuzzing.

Testcase can be reproduced using the following commands:

$ pip install fuzzfetch
$ python -m fuzzfetch --build 653f0dc8442d -a --fuzzing --target firefox gtest -n firefox
$ FUZZER=URIParser ./firefox/firefox testcase.bin
Hit MOZ_CRASH(nsStandardURL::SanityCheck failed) at /netwerk/base/nsStandardURL.cpp:298

    ==207==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000001 (pc 0x777d07dbef34 bp 0x7ffe76bdf070 sp 0x7ffe76bdef20 T0)
    ==207==The signal is caused by a WRITE memory access.
    ==207==Hint: address points to the zero page.
    SCARINESS: 10 (null-deref)
        #0 0x777d07dbef34 in mozilla::net::nsStandardURL::SanityCheck() /netwerk/base/nsStandardURL.cpp:298:5
        #1 0x777d07dcdb73 in mozilla::net::nsStandardURL::SetSpecWithEncoding(nsTSubstring<char> const&, mozilla::Encoding const*) /netwerk/base/nsStandardURL.cpp:1816:3
        #2 0x777d07de13df in mozilla::net::nsStandardURL::Init(unsigned int, int, nsTSubstring<char> const&, char const*, nsIURI*) /netwerk/base/nsStandardURL.cpp:3577:12
        #3 0x777d07df0f5f in Init /netwerk/base/nsStandardURL.h:446:16
        #4 0x777d07df0f5f in non-virtual thunk to mozilla::net::nsStandardURL::TemplatedMutator<mozilla::net::nsStandardURL>::Init(unsigned int, int, nsTSubstring<char> const&, char const*, nsIURI*, nsIURIMutator**) /netwerk/base/nsStandardURL.h
        #5 0x777d095f4258 in Apply<nsresult (nsIStandardURLMutator::*)(unsigned int, int, const nsTSubstring<char> &, const char *, nsIURI *, nsIURIMutator **), nsIStandardURL::(unnamed enum at /builds/worker/workspace/obj-build/dist/include/nsIStandardURL.h:35:3), int, nsTAutoStringN<char, 64UL> &, const char *&, std::nullptr_t, std::nullptr_t> /builds/worker/workspace/obj-build/dist/include/nsIURIMutator.h:592:15
        #6 0x777d095f4258 in nsJARURI::CreateEntryURL(nsTSubstring<char> const&, char const*, nsIURL**) /modules/libjar/nsJARURI.cpp:85:8
        #7 0x777d095f6594 in SetJAREntry /modules/libjar/nsJARURI.cpp:663:10
        #8 0x777d095f6594 in nsJARURI::SetSpecWithBase(nsTSubstring<char> const&, nsIURI*) /modules/libjar/nsJARURI.cpp:322:10
        #9 0x777d09608f4b in nsJARURI::Mutator::SetSpecBaseCharset(nsTSubstring<char> const&, nsIURI*, char const*) /modules/libjar/nsJARURI.h:134:17
        #10 0x777d07d41ebf in NS_MutateURI& NS_MutateURI::Apply<nsresult (nsIJARURIMutator::*)(nsTSubstring<char> const&, nsIURI*, char const*), nsTSubstring<char> const&, nsIURI*&, char const*&>(nsresult (nsIJARURIMutator::*)(nsTSubstring<char> const&, nsIURI*, char const*), nsTSubstring<char> const&, nsIURI*&, char const*&) /builds/worker/workspace/obj-build/dist/include/nsIURIMutator.h:592:15
        #11 0x777d07d02fbb in NS_NewURI(nsIURI**, nsTSubstring<char> const&, char const*, nsIURI*) /netwerk/base/nsNetUtil.cpp:1978:10
        #12 0x777d03da217e in FuzzingRunURIParser(unsigned char const*, unsigned long) /netwerk/test/fuzz/TestURIFuzzing.cpp:65:17
        #13 0x5e37ff1c927b in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /tools/fuzzing/libfuzzer/FuzzerLoop.cpp:570:11
        #14 0x5e37ff1c8d01 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool*) /tools/fuzzing/libfuzzer/FuzzerLoop.cpp:479:7
        #15 0x5e37ff1ca137 in fuzzer::Fuzzer::MutateAndTestOne() /tools/fuzzing/libfuzzer/FuzzerLoop.cpp:717:19
        #16 0x5e37ff1cab45 in fuzzer::Fuzzer::Loop(std::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /tools/fuzzing/libfuzzer/FuzzerLoop.cpp:861:9
        #17 0x5e37ff1bc16b in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /tools/fuzzing/libfuzzer/FuzzerDriver.cpp:864:14
        #18 0x777d1488422b in mozilla::FuzzerRunner::Run(int*, char***) /tools/fuzzing/interface/harness/FuzzerRunner.cpp:75:13
        #19 0x777d147c61cc in XREMain::XRE_mainStartup(bool*) /toolkit/xre/nsAppRunner.cpp:4696:35
        #20 0x777d147d22ff in XREMain::XRE_main(int, char**, mozilla::BootstrapConfig const&) /toolkit/xre/nsAppRunner.cpp:5971:12
        #21 0x777d147d31e1 in XRE_main(int, char**, mozilla::BootstrapConfig const&) /toolkit/xre/nsAppRunner.cpp:6040:21
        #22 0x5e37ff0220f7 in do_main /browser/app/nsBrowserApp.cpp:230:22
        #23 0x5e37ff0220f7 in main /browser/app/nsBrowserApp.cpp:448:16
        #24 0x777d2a2a7082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e)
        #25 0x5e37fef49a98 in _start (/home/worker/firefox/firefox+0xd5a98) (BuildId: f6f4dd227a5426db521c2d5f9f507aeeee4c5daf)
    
    DEDUP_TOKEN: mozilla::net::nsStandardURL::SanityCheck()
    AddressSanitizer can not provide additional info.
    SUMMARY: AddressSanitizer: SEGV /netwerk/base/nsStandardURL.cpp:298:5 in mozilla::net::nsStandardURL::SanityCheck()
    
    Command: /home/worker/firefox/firefox -rss_limit_mb=3500 -use_value_profile=1 -timeout=5 -entropic=1 -dict=./tokens.dict ./corpora/ -handle_segv=0 -handle_bus=0 -handle_abrt=0 -handle_ill=0 -handle_fpe=0 -print_pcs=1
    
    ==207==ABORTING
Attached file Testcase
Flags: needinfo?(sekim)
See Also: → 1904582
Assignee: nobody → sekim
Flags: needinfo?(sekim)
Severity: -- → S3
Priority: -- → P2
Whiteboard: [necko-triaged]

Could not reproduce this error, but the patch for Bug 1904582 may resolve this issue.

(In reply to Sean Kim from comment #3)

Could not reproduce this error, but the patch for Bug 1904582 may resolve this issue.

I think these two are the same.

Status: NEW → RESOLVED
Closed: 4 months ago
Duplicate of bug: 1904582
Resolution: --- → DUPLICATE
See Also: 1904582
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: