Null-dereference READ in v8::internal::Invoke |
|||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=6503133248487424 Fuzzer: mbarbella_js_mutation_layout Job Type: windows_asan_content_shell Platform Id: windows Crash Type: Null-dereference READ Crash Address: 0x00000000 Crash State: v8::internal::Invoke v8::internal::Execution::Call v8::Function::Call Sanitizer: address (ASAN) Regressed: https://clusterfuzz.com/revisions?job=windows_asan_content_shell&range=478152:478270 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6503133248487424 Issue filed automatically. See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
Jun 10 2017
ClusterFuzz has detected this issue as fixed in range 478323:478347. Detailed report: https://clusterfuzz.com/testcase?key=6503133248487424 Fuzzer: mbarbella_js_mutation_layout Job Type: windows_asan_content_shell Platform Id: windows Crash Type: Null-dereference READ Crash Address: 0x00000000 Crash State: v8::internal::Invoke v8::internal::Execution::Call v8::Function::Call Sanitizer: address (ASAN) Regressed: https://clusterfuzz.com/revisions?job=windows_asan_content_shell&range=478152:478270 Fixed: https://clusterfuzz.com/revisions?job=windows_asan_content_shell&range=478323:478347 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6503133248487424 See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Jun 10 2017
,
Jun 10 2017
ClusterFuzz testcase 6503133248487424 is verified as fixed, so closing issue. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue. |
|||
►
Sign in to add a comment |
|||
Comment 1 by ClusterFuzz
, Jun 10 2017