Direct-leak in webrtc::RTCPHelp::RTCPPacketInformation::AddVoIPMetric |
|||
Issue descriptionDetailed report: https://cluster-fuzz.appspot.com/testcase?key=5668000333561856 Fuzzer: rtcp_receiver_fuzzer Job Type: libfuzzer_chrome_asan Platform Id: linux Crash Type: Direct-leak Crash Address: Crash State: webrtc::RTCPHelp::RTCPPacketInformation::AddVoIPMetric webrtc::RTCPReceiver::HandleXRVOIPMetric webrtc::RTCPReceiver::IncomingRTCPPacket Unminimized Testcase: https://cluster-fuzz.appspot.com/download/AMIfv94Tj5xYuXU7-ocClXmiUTVjjWE8n76i6SU2ZiJjWi-v5JxTRyJ4YFrNSNAlt7Bgb3uwD4t6Vax0DOJC5xwcyNMRdJRKcB_hNnLXry4LVVSTQJZmG6Xal3QhNXqFzdI8OGDUnBL0A6YWUTjg0GHVYWLi105f7w Filer: mmoroz See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
Apr 15 2016
,
Apr 18 2016
The following revision refers to this bug: https://chromium.googlesource.com/external/webrtc.git/+/d6b851a1bd197fcf1f2d8183b6f86a92d5d8ee17 commit d6b851a1bd197fcf1f2d8183b6f86a92d5d8ee17 Author: danilchap <danilchap@webrtc.org> Date: Mon Apr 18 17:54:04 2016 Fixed memleak when two voip blocks present in single rtcp packet. BUG= chromium:603894 Review URL: https://codereview.webrtc.org/1901593002 Cr-Commit-Position: refs/heads/master@{#12413} [modify] https://crrev.com/d6b851a1bd197fcf1f2d8183b6f86a92d5d8ee17/webrtc/modules/rtp_rtcp/source/rtcp_receiver_help.cc [modify] https://crrev.com/d6b851a1bd197fcf1f2d8183b6f86a92d5d8ee17/webrtc/modules/rtp_rtcp/source/rtcp_receiver_help.h [modify] https://crrev.com/d6b851a1bd197fcf1f2d8183b6f86a92d5d8ee17/webrtc/modules/rtp_rtcp/source/rtcp_receiver_unittest.cc
,
Apr 21 2016
,
Apr 21 2016
ClusterFuzz has detected this issue as fixed in range 388468:388498. Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5668000333561856 Fuzzer: rtcp_receiver_fuzzer Job Type: libfuzzer_chrome_asan Platform Id: linux Crash Type: Direct-leak Crash Address: Crash State: webrtc::RTCPHelp::RTCPPacketInformation::AddVoIPMetric webrtc::RTCPReceiver::HandleXRVOIPMetric webrtc::RTCPReceiver::IncomingRTCPPacket Fixed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=388468:388498 Unminimized Testcase: https://cluster-fuzz.appspot.com/download/AMIfv94Tj5xYuXU7-ocClXmiUTVjjWE8n76i6SU2ZiJjWi-v5JxTRyJ4YFrNSNAlt7Bgb3uwD4t6Vax0DOJC5xwcyNMRdJRKcB_hNnLXry4LVVSTQJZmG6Xal3QhNXqFzdI8OGDUnBL0A6YWUTjg0GHVYWLi105f7w See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Nov 22 2016
Removing EditIssue view restrictions from ClusterFuzz filed bugs. If you believe that this issue should still be restricted, please reapply the label. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||
►
Sign in to add a comment |
|||
Comment 1 by mmoroz@chromium.org
, Apr 15 2016Owner: pbos@chromium.org