[llvm-bugs] Issue 4588 in oss-fuzz: llvm/clang-fuzzer: Stack-buffer-overflow in clang::expandUCNs

ClusterFuzz-External via monorail via llvm-bugs llvm-bugs at lists.llvm.org
Sun Dec 10 21:49:59 PST 2017

Status: New
Owner: ----
CC: kcc at google.com, mascasa at google.com, jdevlieg... at apple.com,  
llvm-b... at lists.llvm.org, v... at apple.com
Labels: ClusterFuzz Stability-Memory-AddressSanitizer Reproducible  
Engine-libfuzzer Proj-llvm Reported-2017-12-11
Type: Bug-Security

New issue 4588 by ClusterFuzz-External: llvm/clang-fuzzer:  
Stack-buffer-overflow in clang::expandUCNs

Detailed report: https://oss-fuzz.com/testcase?key=5041559499177984

Project: llvm
Fuzzer: libFuzzer_llvm_clang-fuzzer
Fuzz target binary: clang-fuzzer
Job Type: libfuzzer_asan_llvm
Platform Id: linux

Crash Type: Stack-buffer-overflow READ 1
Crash Address: 0x7fcbded34038
Crash State:

Sanitizer: address (ASAN)

Recommended Security Severity: Medium


Reproducer Testcase:  

Issue filed automatically.

See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for  
more information.

When you fix this bug, please
   * mention the fix revision(s).
   * state whether the bug was a short-lived regression or an old bug in any  
stable releases.
   * add any other useful information.
This information can help downstream consumers.

If you have questions for the OSS-Fuzz team, please file an issue at  

You received this message because:
   1. You were specifically CC'd on the issue

You may adjust your notification preferences at:

Reply to this email to add a comment.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20171210/9d4431f4/attachment.html>

More information about the llvm-bugs mailing list