Issue metadata
Sign in to add a comment
|
Heap-use-after-free in net::DnsTransactionImpl::DoCallback |
||||||||||||||||||||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=5387982734622720 Fuzzer: libFuzzer_net_host_resolver_impl_fuzzer Job Type: mac_libfuzzer_chrome_asan Platform Id: mac Crash Type: Heap-use-after-free READ 8 Crash Address: 0x6060000342e0 Crash State: net::DnsTransactionImpl::DoCallback base::OnceCallback<void base::debug::TaskAnnotator::RunTask Sanitizer: address (ASAN) Recommended Security Severity: High Regressed: https://clusterfuzz.com/revisions?job=mac_libfuzzer_chrome_asan&range=518399:518497 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5387982734622720 Issue filed automatically. See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reference.md for more information.
,
Dec 5 2017
Automatically assigning owner based on suspected regression changelist https://chromium.googlesource.com/chromium/src/+/c24c3e90012a5a3135900014fad664c439224053 (Save TTL to cache if in SOA of NXDOMAIN or NODATA results). If this is incorrect, please remove the owner and apply the Test-Predator-Wrong-CLs label.
,
Dec 5 2017
,
Dec 5 2017
This is a serious security regression. If you are not able to fix this quickly, please revert the change that introduced it. If this doesn't affect a release branch, or has not been properly classified for severity, please update the Security_Impact or Security_Severity labels, and remove the ReleaseBlock label. To disable this altogether, apply ReleaseBlock-NA. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Dec 5 2017
,
Dec 6 2017
ClusterFuzz has detected this issue as fixed in range 521603:521669. Detailed report: https://clusterfuzz.com/testcase?key=5387982734622720 Fuzzer: libFuzzer_net_host_resolver_impl_fuzzer Job Type: mac_libfuzzer_chrome_asan Platform Id: mac Crash Type: Heap-use-after-free READ 8 Crash Address: 0x6060000342e0 Crash State: net::DnsTransactionImpl::DoCallback base::OnceCallback<void base::debug::TaskAnnotator::RunTask Sanitizer: address (ASAN) Recommended Security Severity: High Regressed: https://clusterfuzz.com/revisions?job=mac_libfuzzer_chrome_asan&range=518399:518497 Fixed: https://clusterfuzz.com/revisions?job=mac_libfuzzer_chrome_asan&range=521603:521669 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5387982734622720 See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reference.md for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Dec 6 2017
ClusterFuzz testcase 5387982734622720 is verified as fixed, so closing issue as verified. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
Dec 6 2017
,
Mar 14 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Mar 27 2018
,
Mar 31 2018
|
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by ClusterFuzz
, Dec 5 2017Labels: Test-Predator-Auto-Components