Comment #6 on issue 3832 by ClusterFuzz-External: llvm/clang-fuzzer: Stack-buffer-overflow in clang::Lexer::LexAngledStringLiteral
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3832#c6

ClusterFuzz has detected this issue as fixed in range 201801120612:201801130619.

Detailed report: https://oss-fuzz.com/testcase?key=5625920451772416

Project: llvm
Fuzzer: libFuzzer_llvm_clang-fuzzer
Fuzz target binary: clang-fuzzer
Job Type: libfuzzer_asan_llvm
Platform Id: linux

Crash Type: Stack-buffer-overflow READ 1
Crash Address: 0x7f03c4273b38
Crash State:
  clang::Lexer::LexAngledStringLiteral
  clang::Lexer::LexTokenInternal
  clang::Lexer::Lex

Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Fixed: https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm&range=201801120612:201801130619

Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=5625920451772416

See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.

--
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.
_______________________________________________
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs

Reply via email to