Use-of-uninitialized-value in pcache1FetchNoMutex |
|||||||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=6575449888784384 Fuzzer: libFuzzer_sqlite3_dbfuzz2_fuzzer Fuzz target binary: sqlite3_dbfuzz2_fuzzer Job Type: libfuzzer_chrome_msan Platform Id: linux Crash Type: Use-of-uninitialized-value Crash Address: Crash State: pcache1FetchNoMutex getPageNormal ptrmapPut Sanitizer: memory (MSAN) Recommended Security Severity: Medium Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_msan&range=614851:614852 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6575449888784384 Issue filed automatically. See https://www.chromium.org/developers/testing/memorysanitizer#TOC-Reproducing-ClusterFuzz-Bugs for more information.
,
Dec 13
Automatically adding ccs based on OWNERS file / target commit history. If this is incorrect, please add ClusterFuzz-Wrong label.
,
Dec 13
Automatically assigning owner based on suspected regression changelist https://chromium.googlesource.com/chromium/src/+/e3140a8f27345d395ea75fe619d730951a438e89 (Run SQLite DBFuzz2 on ClusterFuzz to fuzz for data corruption). If this is incorrect, please let us know why and apply the Test-Predator-Wrong-CLs label. If you aren't the correct owner for this issue, please unassign yourself as soon as possible so it can be re-triaged.
,
Dec 13
,
Dec 13
This is a serious security regression. If you are not able to fix this quickly, please revert the change that introduced it. If this doesn't affect a release branch, or has not been properly classified for severity, please update the Security_Impact or Security_Severity labels, and remove the ReleaseBlock label. To disable this altogether, apply ReleaseBlock-NA. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Dec 13
,
Dec 13
Dbfuzz2 doesn't find security bugs, derestricting.
,
Dec 15
,
Dec 15
pwnall@ there's a chance this is in our own code.
,
Jan 12
ClusterFuzz has detected this issue as fixed in range 622204:622215. Detailed report: https://clusterfuzz.com/testcase?key=6575449888784384 Fuzzer: libFuzzer_sqlite3_dbfuzz2_fuzzer Fuzz target binary: sqlite3_dbfuzz2_fuzzer Job Type: libfuzzer_chrome_msan Platform Id: linux Crash Type: Use-of-uninitialized-value Crash Address: Crash State: pcache1FetchNoMutex getPageNormal ptrmapPut Sanitizer: memory (MSAN) Recommended Security Severity: Medium Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_msan&range=614851:614852 Fixed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_msan&range=622204:622215 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6575449888784384 See https://www.chromium.org/developers/testing/memorysanitizer#TOC-Reproducing-ClusterFuzz-Bugs for instructions to reproduce this bug locally. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Jan 12
ClusterFuzz testcase 6575449888784384 is verified as fixed, so closing issue as verified. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue. |
|||||||||
►
Sign in to add a comment |
|||||||||
Comment 1 by ClusterFuzz
, Dec 13Labels: Test-Predator-Auto-Components