Comment #3 on issue 3679 by
monor...@clusterfuzz-external.iam.gserviceaccount.com:
llvm/llvm-isel-fuzzer--aarch64-O2: Direct-leak in
llvm::BitcodeReaderValueList::getValueFwdRef
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3679#c3
ClusterFuzz has detected this issue as fixed in range
201711140614:201711141648.
Detailed report: https://oss-fuzz.com/testcase?key=5792447943671808
Project: llvm
Fuzzer: libFuzzer_llvm_llvm-isel-fuzzer--aarch64-O2
Fuzz target binary: llvm-isel-fuzzer--aarch64-O2
Job Type: libfuzzer_asan_llvm
Platform Id: linux
Crash Type: Direct-leak
Crash Address:
Crash State:
llvm::BitcodeReaderValueList::getValueFwdRef
BitcodeReader::getValueTypePair
BitcodeReader::parseFunctionBody
Sanitizer: address (ASAN)
Regressed:
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm&range=201710160455:201710190451
Fixed:
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm&range=201711140614:201711141648
Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=5792447943671808
See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for
more information.
If you suspect that the result above is incorrect, try re-doing that job on
the test case report page.
--
You received this message because:
1. You were specifically CC'd on the issue
You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings
Reply to this email to add a comment.
_______________________________________________
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs