Integer-overflow in speex_packet |
||
Issue descriptionDetailed report: https://cluster-fuzz.appspot.com/testcase?key=5968082508185600 Fuzzer: ochang_search_index_mutator Job Type: linux_ubsan_chrome Platform Id: linux Crash Type: Integer-overflow Crash Address: Crash State: speex_packet ogg_packet ogg_get_length Regressed: https://cluster-fuzz.appspot.com/revisions?job=linux_ubsan_chrome&range=370022:370027 Minimized Testcase (1.93 Kb): https://cluster-fuzz.appspot.com/download/AMIfv94zw7aISCIqJ16vQ7E3Ain2iEn9QmCjMK2zPmUmMA2N8cHVtKT1bLWiAysfFr6C_mLxNYEwdw2b8bXWbmwLHouSmBQH5kCXzxBj7Lj8-mKMfHBy1LKs-Xso3hy_AdLItV_OlsZJD1tHGPfNzzNKFlaMIpQvdA?testcase_id=5968082508185600 Issue filed automatically. See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
Dec 14 2016
ClusterFuzz testcase 5968082508185600 is verified as fixed, so closing issue. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue. |
||
►
Sign in to add a comment |
||
Comment 1 by ClusterFuzz
, Dec 14 2016