New issue
Advanced search Search tips

Issue 628775 link

Starred by 1 user

Issue metadata

Status: Verified
Owner: ----
Closed: Aug 2016
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 1
Type: Bug



Sign in to add a comment

NO STACK

Project Member Reported by ClusterFuzz, Jul 15 2016

Issue description

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6549845380956160

Fuzzer: mbarbella_js_mutation
Job Type: linux_ubsan_vptr_d8
Platform Id: linux

Crash Type: Fatal error
Crash Address: 
Crash State:
  NULL
Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_ubsan_vptr_d8&range=379854:379900

Minimized Testcase (0.23 Kb):
Download: https://cluster-fuzz.appspot.com/download/AMIfv94viE0byqZjwSXFP2SrXI60fApUjMYPpY6BdCJbvvdgmFPQY28QThma_yliEKahirb2orV_nJy9F-PIuCOlsoz17A6KewxNHu8EnomRLXgSi6a1ACQ93AAZEsIbU1D-kjHjYXOcdxA2vxliJLLc1Atqj-BvQA?testcase_id=6549845380956160
function __f_4(stdlib, foreign, buffer) {
  "use asm";
  var __v_6 = new stdlib.Float64Array(buffer);
  function __f_3() {
    __v_6 = __v_6;
  }
  return {__f_3: __f_3};
}
  var module = Wasm.instantiateModuleFromAsm( __f_4.toString());


Filer: mmohammad

See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
 
Project Member

Comment 1 by ClusterFuzz, Aug 24 2016

ClusterFuzz has detected this issue as fixed in range 413682:413688.

Detailed report: https://cluster-fuzz.appspot.com/testcase?key=6549845380956160

Fuzzer: mbarbella_js_mutation
Job Type: linux_ubsan_vptr_d8
Platform Id: linux

Crash Type: Fatal error
Crash Address: 
Crash State:
  NULL
Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_ubsan_vptr_d8&range=379854:379900
Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_ubsan_vptr_d8&range=413682:413688

Minimized Testcase (0.23 Kb):
Download: https://cluster-fuzz.appspot.com/download/AMIfv94viE0byqZjwSXFP2SrXI60fApUjMYPpY6BdCJbvvdgmFPQY28QThma_yliEKahirb2orV_nJy9F-PIuCOlsoz17A6KewxNHu8EnomRLXgSi6a1ACQ93AAZEsIbU1D-kjHjYXOcdxA2vxliJLLc1Atqj-BvQA?testcase_id=6549845380956160
function __f_4(stdlib, foreign, buffer) {
  "use asm";
  var __v_6 = new stdlib.Float64Array(buffer);
  function __f_3() {
    __v_6 = __v_6;
  }
  return {__f_3: __f_3};
}
  var module = Wasm.instantiateModuleFromAsm( __f_4.toString());


See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 2 by ClusterFuzz, Aug 31 2016

Labels: ClusterFuzz-Verified
Status: Verified (was: Available)
ClusterFuzz testcase is verified as fixed, closing issue.

If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
Project Member

Comment 3 by sheriffbot@chromium.org, Nov 22 2016

Labels: -Restrict-View-EditIssue
Removing EditIssue view restrictions from ClusterFuzz filed bugs. If you believe that this issue should still be restricted, please reapply the label.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment