Direct-leak in DecodeForDeserialization |
|||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=5542121351413760 Fuzzer: afl_content_security_policy_fuzzer Job Type: afl_chrome_asan Platform Id: linux Crash Type: Direct-leak Crash Address: Crash State: DecodeForDeserialization v8::internal::Deserializer::PostProcessNewObject v8::internal::Deserializer::ReadObject Sanitizer: address (ASAN) Regressed: https://clusterfuzz.com/revisions?job=afl_chrome_asan&range=463567:463605 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5542121351413760 Issue filed automatically. See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for more information.
,
Oct 4 2017
Automatically assigning owner based on suspected regression changelist https://chromium.googlesource.com/v8/v8/+/7a8d20a79f9d5ce6fe589477b09327f3e90bf0e0 ([snapshot] encode resource before serializing.). If this is incorrect, please remove the owner and apply the Test-Predator-Wrong-CLs label.
,
Oct 13 2017
ClusterFuzz testcase 5542121351413760 is flaky and no longer crashes, so closing issue. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
Nov 7 2017
,
Nov 7 2017
|
|||||
►
Sign in to add a comment |
|||||
Comment 1 by ClusterFuzz
, Oct 1 2017Labels: Test-Predator-AutoComponents