Integer-overflow in OT::propagate_attachment_offsets |
|||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=5766597747408896 Fuzzer: inferno_twister Job Type: linux_ubsan_chrome Platform Id: linux Crash Type: Integer-overflow Crash Address: Crash State: OT::propagate_attachment_offsets OT::GPOS::position_finish_offsets hb_ot_position_complex Sanitizer: undefined (UBSAN) Regressed: https://clusterfuzz.com/revisions?job=linux_ubsan_chrome&range=523880:523906 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5766597747408896 Additional requirements: Requires HTTP Issue filed automatically. See https://github.com/google/clusterfuzz-tools for more information.
,
May 31 2018
Non-security numeric overflow is considered WontFix.
,
Jun 7 2018
ClusterFuzz testcase 5766597747408896 is still reproducing on tip-of-tree build (trunk). If this testcase was not reproducible locally or unworkable, ignore this notification and we will file another bug soon with hopefully a better and workable testcase. Otherwise, if this is not intended to be fixed (e.g. this is an intentional crash), please add ClusterFuzz-Ignore label to prevent future bug filing with similar crash stacktrace. |
|||
►
Sign in to add a comment |
|||
Comment 1 by ClusterFuzz
, May 31 2018Labels: Test-Predator-Auto-Components