Issue metadata
Sign in to add a comment
|
Heap-use-after-free in net::DnsTransactionImpl::DoCallback |
||||||||||||||||||||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=6670786621603840 Fuzzer: libFuzzer_net_host_resolver_impl_fuzzer Job Type: libfuzzer_chrome_asan_debug Platform Id: linux Crash Type: Heap-use-after-free READ 8 Crash Address: 0x606000014ba0 Crash State: net::DnsTransactionImpl::DoCallback void base::internal::FunctorTraits<void void base::internal::InvokeHelper<true, void>::MakeItSo<void Sanitizer: address (ASAN) Recommended Security Severity: High Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_asan_debug&range=518449:518477 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6670786621603840 Issue filed automatically. See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reference.md for more information.
,
Nov 24 2017
Automatically assigning owner based on suspected regression changelist https://chromium.googlesource.com/chromium/src/+/c24c3e90012a5a3135900014fad664c439224053 (Save TTL to cache if in SOA of NXDOMAIN or NODATA results). If this is incorrect, please remove the owner and apply the Test-Predator-Wrong-CLs label.
,
Nov 24 2017
,
Nov 24 2017
This is a serious security regression. If you are not able to fix this quickly, please revert the change that introduced it. If this doesn't affect a release branch, or has not been properly classified for severity, please update the Security_Impact or Security_Severity labels, and remove the ReleaseBlock label. To disable this altogether, apply ReleaseBlock-NA. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Nov 24 2017
,
Nov 25 2017
,
Dec 5 2017
ClusterFuzz has detected this issue as fixed in range 521608:521618. Detailed report: https://clusterfuzz.com/testcase?key=6670786621603840 Fuzzer: libFuzzer_net_host_resolver_impl_fuzzer Job Type: libfuzzer_chrome_asan_debug Platform Id: linux Crash Type: Heap-use-after-free READ 8 Crash Address: 0x606000014ba0 Crash State: net::DnsTransactionImpl::DoCallback void base::internal::FunctorTraits<void void base::internal::InvokeHelper<true, void>::MakeItSo<void Sanitizer: address (ASAN) Recommended Security Severity: High Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_asan_debug&range=518449:518477 Fixed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_asan_debug&range=521608:521618 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6670786621603840 See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reference.md for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Mar 14 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by ClusterFuzz
, Nov 24 2017Labels: Test-Predator-Auto-Components