Direct-leak in PixarLogSetupDecode |
||||
Issue descriptionDetailed report: https://cluster-fuzz.appspot.com/testcase?key=4794297732038656 Fuzzer: pdf_codec_tiff_fuzzer Job Type: libfuzzer_chrome_asan Platform Id: linux Crash Type: Direct-leak Crash Address: Crash State: PixarLogSetupDecode PredictorSetupDecode TIFFStartTile Regressed: https://cluster-fuzz.appspot.com/revisions?job=libfuzzer_chrome_asan&range=400757:400887 Minimized Testcase (0.39 Kb): https://cluster-fuzz.appspot.com/download/AMIfv95BPsr-CY10KdGEdJ-ogMYza0JpxsuciSX9aqYG4K_flRdJSbWG1PsAc01OpdS6_sQkE-rhSLj1JPiaPRYrEvhii4b31kQjgvUZ87ClLWNX2JznPODt1yWCeCo-o5zbQV8ryaTgTXWXygS3ou-0H_K_5ZJq8w?testcase_id=4794297732038656 Filer: ajha See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.
,
Oct 18 2016
,
Nov 22 2016
Removing EditIssue view restrictions from ClusterFuzz filed bugs. If you believe that this issue should still be restricted, please reapply the label. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Dec 22 2016
ClusterFuzz testcase 4794297732038656 is flaky and no longer reproduces, so closing issue. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue. |
||||
►
Sign in to add a comment |
||||
Comment 1 by ajha@chromium.org
, Jul 15 2016Components: Tools>Test>FindIt>NoResult
Labels: M-54 Te-Logged
Owner: hong_zh...@foxitsoftware.com
Status: Assigned (was: Available)