漏洞关键信息 漏洞类型: Use-after-poison (类型:Vulnerability) 紧急程度: P1 严重性: S1 状态: Fixed 报告详情 提交者: cl...@chromium.org 报告时间: May 10, 2019 03:46AM 技术细节 详细报告链接: clusterfuzz.com/testcase?key=5123137526693888 Job Type: linux_asan_chrome_mp 平台: Linux 崩溃类型: Use-after-poison READ 1 崩溃地址: 0x7e87dd4ed360 崩溃状态: blink::xpath::Expression::AddSubExpression -> xpathyyparse -> blink::xpath::Parser::ParseStatement Sanitizer: AddressSanitizer (ASAN) 提供资源 Reproducer Testcase: clusterfuzz.com/download?testcase_id=5123137526693888 附加信息 报告者消息: This bug was reported over email by bugfense@protonmail.com. It's a UAF in blink/xpath processor. 致谢: Credit提到BUGFENSE Anonymous Bug Bounties。 修复时间: Deadline for patch: 90 days,全公开前。 以上信息可以帮助理解这一使用后中毒漏洞的详细情况,以及报告处理流程。