Integer-overflow in int WTF::toIntegralType<int, unsigned char> |
|||
Issue descriptionDetailed report: https://cluster-fuzz.appspot.com/testcase?key=4760679962902528 Fuzzer: ifratric-browserfuzzer-v3 Job Type: linux_ubsan_chrome Platform Id: linux Crash Type: Integer-overflow Crash Address: Crash State: int WTF::toIntegralType<int, unsigned char> toInt blink::HTMLTableColElement::parseAttribute Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_ubsan_chrome&range=370022:370027 Minimized Testcase (0.13 Kb): Download: https://cluster-fuzz.appspot.com/download/AMIfv979qjC_gC2om3Q7__dgaThqlkZnsTLGR3FHcIOMc-XfnO4mCllF3p-D7yP6GYjm7bc1Rp9PYbondbSshdNzfDEmwNP3og5DWS0v1olJuH75MTpZH2jwNK_5ment-J76azxLbCeNbLo7KVFizB-SmNjI-awKHw?testcase_id=4760679962902528 <script> function jsfuzzer() { htmlvar00009.width = "-2147483648"; } </script> <body onload=jsfuzzer()> <table> <col id="htmlvar00009"> Issue filed automatically. See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
Nov 22 2016
Removing EditIssue view restrictions from ClusterFuzz filed bugs. If you believe that this issue should still be restricted, please reapply the label. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Dec 14 2016
ClusterFuzz has detected this issue as fixed in range 435261:438085. Detailed report: https://cluster-fuzz.appspot.com/testcase?key=4760679962902528 Fuzzer: ifratric-browserfuzzer-v3 Job Type: linux_ubsan_chrome Platform Id: linux Crash Type: Integer-overflow Crash Address: Crash State: int WTF::toIntegralType<int, unsigned char> toInt blink::HTMLTableColElement::parseAttribute Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_ubsan_chrome&range=370022:370027 Fixed: https://cluster-fuzz.appspot.com/revisions?job=linux_ubsan_chrome&range=435261:438085 Minimized Testcase (0.13 Kb): Download: https://cluster-fuzz.appspot.com/download/AMIfv979qjC_gC2om3Q7__dgaThqlkZnsTLGR3FHcIOMc-XfnO4mCllF3p-D7yP6GYjm7bc1Rp9PYbondbSshdNzfDEmwNP3og5DWS0v1olJuH75MTpZH2jwNK_5ment-J76azxLbCeNbLo7KVFizB-SmNjI-awKHw?testcase_id=4760679962902528 <script> function jsfuzzer() { htmlvar00009.width = "-2147483648"; } </script> <body onload=jsfuzzer()> <table> <col id="htmlvar00009"> See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Dec 14 2016
ClusterFuzz testcase 4760679962902528 is verified as fixed, so closing issue. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue. |
|||
►
Sign in to add a comment |
|||
Comment 1 by ajha@chromium.org
, Nov 18 2016