NO STACK |
||||
Issue descriptionDetailed report: https://cluster-fuzz.appspot.com/testcase?key=5739831460364288 Fuzzer: mbarbella_js_mutation Job Type: linux_cfi_d8 Platform Id: linux Crash Type: Fatal error Crash Address: Crash State: NULL Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_cfi_d8&range=382986:383020 Minimized Testcase (0.49 Kb): Download: https://cluster-fuzz.appspot.com/download/AMIfv967_flbxovEAeE_CvGx79M4hVqE83wHz6PsnNy1MiITZT0rTl_AbVx0RJmj5MjQgzwHVY7T5oSr3P2POKCxypFs2D9vXGL_4x5miO8EgQFPmSsGB7oB4ukIztvn62eqccTTIf7R4UUZrFXVz-zSkMmTROFfGQ?testcase_id=5739831460364288 function __f_106(stdlib, buffer) { "use asm"; var __v_31 = new stdlib.Int32Array(buffer); function __f_19() { __v_31[2147483648]|4 + 2147483648 | 13; } return {__f_19: __f_19}; } var __v_20 = [ [Int8Array, '>> 0'], [Uint8Array, 'Uint8Array'], [][ '>> 1'], [], []]; for (var __v_28 = 0; __v_28 < __v_20.length; __v_28++) { var __v_2 = __f_106.toString(); __v_2 = __v_2.replace('Int32Array', __v_20[__v_28][1]); var module = Wasm.instantiateModuleFromAsm(__v_2); } ( { })(); Filer: mmohammad See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
Jul 14 2016
,
Jul 14 2016
Can't reproduce. The bug might have been fixed with one of the recent patches.
,
Nov 22 2016
Removing EditIssue view restrictions from ClusterFuzz filed bugs. If you believe that this issue should still be restricted, please reapply the label. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
||||
►
Sign in to add a comment |
||||
Comment 1 by mstarzinger@chromium.org
, Jul 14 2016Owner: titzer@chromium.org
Status: Assigned (was: Available)