Null-dereference READ in base::CommandLine::HasSwitch |
|||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=5061770949165056 Fuzzer: libFuzzer_hit_test_query_fuzzer Fuzz target binary: hit_test_query_fuzzer Job Type: windows_libfuzzer_chrome_asan Platform Id: windows Crash Type: Null-dereference READ Crash Address: 0x000000000018 Crash State: base::CommandLine::HasSwitch features::IsVizHitTestingSurfaceLayerEnabled viz::HitTestQuery::GetTransformToTargetRecursively Sanitizer: address (ASAN) Regressed: https://clusterfuzz.com/revisions?job=windows_libfuzzer_chrome_asan&range=615633:615663 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5061770949165056 Issue filed automatically. See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing_on_windows.md for more information.
,
Dec 12
Automatically applying components based on crash stacktrace and information from OWNERS files. If this is incorrect, please apply the Test-Predator-Wrong-Components label.
,
Dec 12
Automatically adding ccs based on OWNERS file / target commit history. If this is incorrect, please add ClusterFuzz-Wrong label.
,
Dec 12
Automatically assigning owner based on suspected regression changelist https://chromium.googlesource.com/chromium/src/+/cc346947ff37b367a388f7d5252d1f77d24d1e1b (Do not offset location by region's origin in V2 hit testing). If this is incorrect, please let us know why and apply the Test-Predator-Wrong-CLs label. If you aren't the correct owner for this issue, please unassign yourself as soon as possible so it can be re-triaged.
,
Dec 14
ClusterFuzz has detected this issue as fixed in range 616369:616409. Detailed report: https://clusterfuzz.com/testcase?key=5061770949165056 Fuzzer: libFuzzer_hit_test_query_fuzzer Fuzz target binary: hit_test_query_fuzzer Job Type: windows_libfuzzer_chrome_asan Platform Id: windows Crash Type: Null-dereference READ Crash Address: 0x000000000018 Crash State: base::CommandLine::HasSwitch features::IsVizHitTestingSurfaceLayerEnabled viz::HitTestQuery::GetTransformToTargetRecursively Sanitizer: address (ASAN) Regressed: https://clusterfuzz.com/revisions?job=windows_libfuzzer_chrome_asan&range=615633:615663 Fixed: https://clusterfuzz.com/revisions?job=windows_libfuzzer_chrome_asan&range=616369:616409 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5061770949165056 See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing_on_windows.md for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Dec 14
ClusterFuzz testcase 5061770949165056 is verified as fixed, so closing issue as verified. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
Dec 14
The documentation for reproducing bugs on Windows was moved to: https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md |
|||||
►
Sign in to add a comment |
|||||
Comment 1 by ClusterFuzz
, Dec 12