Crash in v8::Message::ErrorLevel |
|||
Issue descriptionDetailed report: https://cluster-fuzz.appspot.com/testcase?key=4506116685037568 Fuzzer: mbarbella_js_mutation Job Type: windows_asan_d8 Platform Id: windows Crash Type: UNKNOWN READ Crash Address: 0x00000000 Crash State: v8::Message::ErrorLevel v8::internal::MessageHandler::ReportMessage v8::internal::AsmJs::CompileAsmViaWasm Sanitizer: address (ASAN) Regressed: https://cluster-fuzz.appspot.com/revisions?job=windows_asan_d8&range=444720:444724 Minimized Testcase (0.12 Kb): Download: https://cluster-fuzz.appspot.com/download/AMIfv9766v-iAT1XnXgHC52snAN09yEnH2dyjmBd4xizk-xb06jkU3EtVsJA0pQSvfFwn2NjoFoxwFsYp9QRMu9y3rxaxCIKw449zo47gyaInsB6TMbF5WglY3HfWOTb8_Nn6aoosNzHgoiv22frgZQPSc5Kn2YtllyNDjRGNKdUwnNqqJ_MYocEwDzR5IIvIGD5Ba6KiiEr6MBZm2YekT2NBG7TvXoPU5v42jyUTP6xyHhHg4o8Wuk3YWxS72H32Nyl8XBNAYIBvyo9Aiqkv3mc7EobX7uA_cyeqJols-NWld9P39nPqmOmBHswmWuFjLNXIKw3q6xAKGVq6GJrTrMQLOwD8QkDYVMFYl2cHE-tPZiLcpR6Bpk?testcase_id=4506116685037568 function __f_2() { "use asm"; function __f_3() { switch (11) { case 0: break foo; } } } __f_2(); Issue filed automatically. See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
Jan 24 2017
,
Jan 24 2017
ClusterFuzz has detected this issue as fixed in range 445054:445058. Detailed report: https://cluster-fuzz.appspot.com/testcase?key=4506116685037568 Fuzzer: mbarbella_js_mutation Job Type: windows_asan_d8 Platform Id: windows Crash Type: UNKNOWN READ Crash Address: 0x00000000 Crash State: v8::Message::ErrorLevel v8::internal::MessageHandler::ReportMessage v8::internal::AsmJs::CompileAsmViaWasm Sanitizer: address (ASAN) Regressed: https://cluster-fuzz.appspot.com/revisions?job=windows_asan_d8&range=444720:444724 Fixed: https://cluster-fuzz.appspot.com/revisions?job=windows_asan_d8&range=445054:445058 Minimized Testcase (0.12 Kb): Download: https://cluster-fuzz.appspot.com/download/AMIfv9766v-iAT1XnXgHC52snAN09yEnH2dyjmBd4xizk-xb06jkU3EtVsJA0pQSvfFwn2NjoFoxwFsYp9QRMu9y3rxaxCIKw449zo47gyaInsB6TMbF5WglY3HfWOTb8_Nn6aoosNzHgoiv22frgZQPSc5Kn2YtllyNDjRGNKdUwnNqqJ_MYocEwDzR5IIvIGD5Ba6KiiEr6MBZm2YekT2NBG7TvXoPU5v42jyUTP6xyHhHg4o8Wuk3YWxS72H32Nyl8XBNAYIBvyo9Aiqkv3mc7EobX7uA_cyeqJols-NWld9P39nPqmOmBHswmWuFjLNXIKw3q6xAKGVq6GJrTrMQLOwD8QkDYVMFYl2cHE-tPZiLcpR6Bpk?testcase_id=4506116685037568 function __f_2() { "use asm"; function __f_3() { switch (11) { case 0: break foo; } } } __f_2(); See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Jan 24 2017
ClusterFuzz testcase 4506116685037568 is verified as fixed, so closing issue. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue. |
|||
►
Sign in to add a comment |
|||
Comment 1 by mstarzinger@chromium.org
, Jan 23 2017Owner: bradnelson@chromium.org
Status: Assigned (was: Untriaged)