Issue metadata
Sign in to add a comment
|
Heap-buffer-overflow in ReadUnalignedValue<unsigned |
||||||||||||||||||||||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=6092768110968832 Fuzzer: libFuzzer_v8_wasm_fuzzer Job Type: libfuzzer_chrome_asan_debug Platform Id: linux Crash Type: Heap-buffer-overflow READ 1 Crash Address: 0x60f0000002c4 Crash State: ReadUnalignedValue<unsigned ReadLittleEndianValue<unsigned read_little_endian<unsigned Sanitizer: address (ASAN) Recommended Security Severity: Medium Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_asan_debug&range=524053:524063 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6092768110968832 Issue filed automatically. See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reference.md for more information.
,
Dec 16 2017
Automatically adding ccs based on suspected regression changelists: [wasm] Simplify bounds check by clemensh@chromium.org - https://chromium.googlesource.com/v8/v8/+/5aaeb2fd1c5fb08bf1f96563d5f891621a428a0b [wasm] Introduce LoadType and StoreType enums by clemensh@chromium.org - https://chromium.googlesource.com/v8/v8/+/aba57b116410d42d0cfc8201680398a9d83b54cd If this is incorrect, please apply the Test-Predator-Wrong-CLs label.
,
Dec 16 2017
,
Dec 16 2017
This is a serious security regression. If you are not able to fix this quickly, please revert the change that introduced it. If this doesn't affect a release branch, or has not been properly classified for severity, please update the Security_Impact or Security_Severity labels, and remove the ReleaseBlock label. To disable this altogether, apply ReleaseBlock-NA. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Dec 16 2017
,
Dec 18 2017
clemensh@ Could you take a look at this, or help find an owner?
,
Dec 18 2017
,
Dec 18 2017
,
Dec 20 2017
ClusterFuzz has detected this issue as fixed in range 525156:525177. Detailed report: https://clusterfuzz.com/testcase?key=6092768110968832 Fuzzer: libFuzzer_v8_wasm_fuzzer Job Type: libfuzzer_chrome_asan_debug Platform Id: linux Crash Type: Heap-buffer-overflow READ 1 Crash Address: 0x60f0000002c4 Crash State: ReadUnalignedValue<unsigned ReadLittleEndianValue<unsigned read_little_endian<unsigned Sanitizer: address (ASAN) Recommended Security Severity: Medium Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_asan_debug&range=524053:524063 Fixed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_asan_debug&range=525156:525177 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6092768110968832 See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reference.md for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Mar 27 2018
,
Mar 29 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||||
Comment 1 by ClusterFuzz
, Dec 16 2017Labels: Test-Predator-Auto-Components