Issue metadata
Sign in to add a comment
|
Use-of-uninitialized-value in cc::PaintOpReader::Read |
||||||||||||||||||||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=4870900498563072 Fuzzer: libFuzzer_paint_op_buffer_eq_fuzzer Job Type: libfuzzer_chrome_msan Platform Id: linux Crash Type: Use-of-uninitialized-value Crash Address: Crash State: cc::PaintOpReader::Read cc::DrawImageRectOp::Deserialize cc::PaintOp::Deserialize Sanitizer: memory (MSAN) Recommended Security Severity: Medium Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_msan&range=527091:527111 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=4870900498563072 Issue filed automatically. See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reference.md for more information.
,
Jan 5 2018
Automatically assigning owner based on suspected regression changelist https://chromium.googlesource.com/chromium/src/+/8b8436915204fb6de906de699e125123bf9b4b94 (OOP: Image Support). If this is incorrect, please remove the owner and apply the Test-Predator-Wrong-CLs label.
,
Jan 5 2018
,
Jan 5 2018
,
Jan 5 2018
This is a serious security regression. If you are not able to fix this quickly, please revert the change that introduced it. If this doesn't affect a release branch, or has not been properly classified for severity, please update the Security_Impact or Security_Severity labels, and remove the ReleaseBlock label. To disable this altogether, apply ReleaseBlock-NA. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Jan 5 2018
,
Jan 8 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/0552d25ffb709becf42d8e99ffb6a52f2d04002a commit 0552d25ffb709becf42d8e99ffb6a52f2d04002a Author: Eric Karl <ericrk@chromium.org> Date: Mon Jan 08 18:57:30 2018 OOP: Check for reader validity in PaintImage deserialization We were using a potentially uninitialized |transfer_cache_entry_id|, as we didn't check for a successful read. R=enne@chromium.org Bug: 799325 Cq-Include-Trybots: master.tryserver.blink:linux_trusty_blink_rel;master.tryserver.chromium.android:android_optional_gpu_tests_rel Change-Id: I1cf64698a85583ca96532ee5dfd2a75d4b3e8187 Reviewed-on: https://chromium-review.googlesource.com/853254 Commit-Queue: enne <enne@chromium.org> Reviewed-by: enne <enne@chromium.org> Cr-Commit-Position: refs/heads/master@{#527691} [modify] https://crrev.com/0552d25ffb709becf42d8e99ffb6a52f2d04002a/cc/paint/paint_op_reader.cc
,
Jan 9 2018
ClusterFuzz has detected this issue as fixed in range 527681:527694. Detailed report: https://clusterfuzz.com/testcase?key=4870900498563072 Fuzzer: libFuzzer_paint_op_buffer_eq_fuzzer Job Type: libfuzzer_chrome_msan Platform Id: linux Crash Type: Use-of-uninitialized-value Crash Address: Crash State: cc::PaintOpReader::Read cc::DrawImageRectOp::Deserialize cc::PaintOp::Deserialize Sanitizer: memory (MSAN) Recommended Security Severity: Medium Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_msan&range=527091:527111 Fixed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_msan&range=527681:527694 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=4870900498563072 See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reference.md for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Jan 9 2018
ClusterFuzz testcase 4870900498563072 is verified as fixed, so closing issue as verified. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
Jan 9 2018
,
Feb 13 2018
,
Mar 27 2018
,
Apr 17 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by ClusterFuzz
, Jan 5 2018Labels: Test-Predator-Auto-Components