Integer-overflow in mov_read_stts |
|||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=4855476780269568 Fuzzer: libFuzzer_media_pipeline_integration_fuzzer Job Type: libfuzzer_chrome_ubsan Platform Id: linux Crash Type: Integer-overflow Crash Address: Crash State: mov_read_stts mov_read_default mov_read_default Sanitizer: undefined (UBSAN) Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_ubsan&range=413192:413325 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=4855476780269568 Issue filed automatically. See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.
,
Sep 19 2017
Issue 732065 has been merged into this issue.
,
Oct 24 2017
For more information, please see https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reference.md. The link referenced in the description is no longer valid. (bulk edit)
,
Nov 19 2017
ClusterFuzz testcase 5402979422437376 is verified as fixed, so closing issue as verified. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
Nov 26 2017
ClusterFuzz testcase 4855476780269568 is still reproducing on tip-of-tree build (trunk). Please re-test your fix against this testcase and if the fix was incorrect or incomplete, please re-open the bug. Otherwise, ignore this notification and add ClusterFuzz-Wrong label. |
|||
►
Sign in to add a comment |
|||
Comment 1 by msrchandra@chromium.org
, Sep 19 2017Labels: Test-Predator-Wrong M-63
Owner: jrumm...@chromium.org
Status: Assigned (was: Untriaged)