Integer-overflow in mov_read_header |
|||||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=4845655148986368 Fuzzer: libFuzzer_audio_decoder_fuzzer Fuzz target binary: audio_decoder_fuzzer Job Type: libfuzzer_chrome_ubsan Platform Id: linux Crash Type: Integer-overflow Crash Address: Crash State: mov_read_header avformat_open_input media::FFmpegGlue::OpenContext Sanitizer: undefined (UBSAN) Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_ubsan&range=546308:546319 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=4845655148986368 Issue filed automatically. See https://github.com/google/clusterfuzz-tools for instructions to reproduce this bug locally.
,
Dec 16
Automatically adding ccs based on OWNERS file / target commit history. If this is incorrect, please add ClusterFuzz-Wrong label.
,
Dec 16
Automatically assigning owner based on suspected regression changelist https://chromium.googlesource.com/chromium/src/+/4b5068a99a84ff2edb34aa0549afc89aa751ccb4 (Add audio_decoder_fuzzer fuzz target.). If this is incorrect, please let us know why and apply the Test-Predator-Wrong-CLs label. If you aren't the correct owner for this issue, please unassign yourself as soon as possible so it can be re-triaged.
,
Dec 17
,
Dec 18
,
Jan 2
,
Jan 2
|
|||||||
►
Sign in to add a comment |
|||||||
Comment 1 by ClusterFuzz
, Dec 16Labels: Test-Predator-Auto-Components