Heap-buffer-overflow in ptrmapPutOvflPtr |
|||||||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=5663066831978496 Fuzzer: libFuzzer_sqlite3_dbfuzz2_fuzzer Fuzz target binary: sqlite3_dbfuzz2_fuzzer Job Type: windows_libfuzzer_chrome_asan Platform Id: windows Crash Type: Heap-buffer-overflow READ 4 Crash Address: 0x1234ae58178e Crash State: ptrmapPutOvflPtr setChildPtrmaps copyNodeContent Sanitizer: address (ASAN) Recommended Security Severity: Medium Regressed: https://clusterfuzz.com/revisions?job=windows_libfuzzer_chrome_asan&range=614851:614852 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5663066831978496 Issue filed automatically. See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing_on_windows.md for more information.
,
Dec 13
Automatically adding ccs based on OWNERS file / target commit history. If this is incorrect, please add ClusterFuzz-Wrong label.
,
Dec 13
Automatically assigning owner based on suspected regression changelist https://chromium.googlesource.com/chromium/src/+/e3140a8f27345d395ea75fe619d730951a438e89 (Run SQLite DBFuzz2 on ClusterFuzz to fuzz for data corruption). If this is incorrect, please let us know why and apply the Test-Predator-Wrong-CLs label. If you aren't the correct owner for this issue, please unassign yourself as soon as possible so it can be re-triaged.
,
Dec 13
,
Dec 13
This is a serious security regression. If you are not able to fix this quickly, please revert the change that introduced it. If this doesn't affect a release branch, or has not been properly classified for severity, please update the Security_Impact or Security_Severity labels, and remove the ReleaseBlock label. To disable this altogether, apply ReleaseBlock-NA. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Dec 13
,
Dec 13
Dbfuzz2 doesn't find security bugs, derestricting.
,
Dec 14
The documentation for reproducing on Windows has been moved to https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md
,
Dec 15
,
Jan 12
ClusterFuzz has detected this issue as fixed in range 622191:622221. Detailed report: https://clusterfuzz.com/testcase?key=5663066831978496 Fuzzer: libFuzzer_sqlite3_dbfuzz2_fuzzer Fuzz target binary: sqlite3_dbfuzz2_fuzzer Job Type: windows_libfuzzer_chrome_asan Platform Id: windows Crash Type: Heap-buffer-overflow READ 4 Crash Address: 0x1234ae58178e Crash State: ptrmapPutOvflPtr setChildPtrmaps copyNodeContent Sanitizer: address (ASAN) Recommended Security Severity: Medium Regressed: https://clusterfuzz.com/revisions?job=windows_libfuzzer_chrome_asan&range=614851:614852 Fixed: https://clusterfuzz.com/revisions?job=windows_libfuzzer_chrome_asan&range=622191:622221 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5663066831978496 See https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/reproducing.md for instructions to reproduce this bug locally. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Jan 12
ClusterFuzz testcase 5663066831978496 is verified as fixed, so closing issue as verified. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue. |
|||||||||
►
Sign in to add a comment |
|||||||||
Comment 1 by ClusterFuzz
, Dec 13Labels: Test-Predator-Auto-Components