Integer-overflow in theora_packet |
||||||||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=4671122034130944 Fuzzer: libFuzzer_audio_decoder_fuzzer Job Type: libfuzzer_chrome_ubsan Platform Id: linux Crash Type: Integer-overflow Crash Address: Crash State: theora_packet ogg_packet ogg_get_length Sanitizer: undefined (UBSAN) Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_ubsan&range=546308:546319 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=4671122034130944 Issue filed automatically. See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reference.md for more information.
,
Apr 19 2018
Automatically assigning owner based on suspected regression changelist https://chromium.googlesource.com/chromium/src/+/4b5068a99a84ff2edb34aa0549afc89aa751ccb4 (Add audio_decoder_fuzzer fuzz target.). If this is incorrect, please let us know why and apply the Test-Predator-Wrong-CLs label. If you aren't the correct owner for this issue, please unassign yourself as soon as possible so it can be re-triaged.
,
Apr 19 2018
Matt, could you please help to find an owner?
,
Apr 19 2018
,
Apr 24 2018
,
Dec 1
ClusterFuzz testcase 4671122034130944 appears to be flaky, updating reproducibility label.
,
Dec 1
Please ignore the last comment about testcase being unreproducible. The testcase is still reproducible. This happened due to a code refactoring on ClusterFuzz side, and the underlying root cause is now fixed. Resetting the label back to Reproducible. Sorry about the inconvenience caused from these incorrect notifications.
,
Dec 1
Please ignore the last comment about testcase being unreproducible. The testcase is still reproducible. This happened due to a code refactoring on ClusterFuzz side, and the underlying root cause is now fixed. Resetting the label back to Reproducible. Sorry about the inconvenience caused from these incorrect notifications.
,
Dec 12
ClusterFuzz has detected this issue as fixed in range 615699:615711. Detailed report: https://clusterfuzz.com/testcase?key=4671122034130944 Fuzzer: libFuzzer_audio_decoder_fuzzer Fuzz target binary: audio_decoder_fuzzer Job Type: libfuzzer_chrome_ubsan Platform Id: linux Crash Type: Integer-overflow Crash Address: Crash State: theora_packet ogg_packet ogg_get_length Sanitizer: undefined (UBSAN) Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_ubsan&range=546308:546319 Fixed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_ubsan&range=615699:615711 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=4671122034130944 See https://github.com/google/clusterfuzz-tools for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Dec 12
ClusterFuzz testcase 4671122034130944 is verified as fixed, so closing issue as verified. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
Dec 12
+mmoroz, is this legit? There were a bunch of closed as fixed ClusterFuzz bugs this morning, but that range has nothing that could have fixed this??
,
Dec 12
Yeah, sorry about that one as well. A proper build has just been uploaded and now I'm kicking off the progression task which should (hopefully) re-open those incorrectly closed bugs. If not, I'll re-open them manually.
,
Dec 12
|
||||||||||
►
Sign in to add a comment |
||||||||||
Comment 1 by ClusterFuzz
, Apr 19 2018Labels: Test-Predator-Auto-Components