public inbox for elfutils@sourceware.org
 help / color / mirror / Atom feed
From: Mark Wielaard <mark@klomp.org>
To: Evgeny Vereshchagin <evvers@ya.ru>, elfutils-devel@sourceware.org
Cc: ClusterFuzz-External via monorail <monorail+v2.382749006@chromium.org>
Subject: Re: Issue 62071 in oss-fuzz: elfutils:fuzz-libdwfl: Null-dereference READ in chunk_compare
Date: Thu, 07 Sep 2023 11:38:31 +0200	[thread overview]
Message-ID: <24426fdda75c3357ef3ac7c98e5eff3f3940fee7.camel@klomp.org> (raw)
In-Reply-To: <000000000000bc51f00604a9a4ff@google.com>

Hi Evgeny,

Do you happen to know what clusterfuzz is trying to tell us? The
detailed report and reproducer testcase are not accessible (they
seems to require a google or github account to login).

It looks like somehow a NULL key got into the search tree. But I cannot
figure out how that would happen.

Thanks,

Mark

On Tue, 2023-09-05 at 22:01 -0700, ClusterFuzz-External via monorail
via Elfutils-devel wrote:
> Status: New
> Owner: ----
> CC: elfut...@sourceware.org, da...@adalogics.com, evv...@gmail.com, izzeem@google.com 
> Labels: ClusterFuzz Stability-Memory-AddressSanitizer Unreproducible Engine-libfuzzer OS-Linux Proj-elfutils Reported-2023-09-06
> Type: Bug
> 
> New issue 62071 by ClusterFuzz-External: elfutils:fuzz-libdwfl: Null-dereference READ in chunk_compare
> https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=62071
> 
> Detailed Report: https://oss-fuzz.com/testcase?key=5999675550072832
> 
> Project: elfutils
> Fuzzing Engine: libFuzzer
> Fuzz Target: fuzz-libdwfl
> Job Type: libfuzzer_asan_i386_elfutils
> Platform Id: linux
> 
> Crash Type: Null-dereference READ
> Crash Address: 0x000000a0
> Crash State:
>   chunk_compare
>   __tsearch
>   elf_getdata_rawchunk
>   
> Sanitizer: address (ASAN)
> 
> Crash Revision: https://oss-fuzz.com/revisions?job=libfuzzer_asan_i386_elfutils&revision=202308240000
> 
> Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=5999675550072832
> 
> Issue filed automatically.
> 
> See https://google.github.io/oss-fuzz/advanced-topics/reproducing for instructions to reproduce this bug locally.
> 
> ************************* UNREPRODUCIBLE *************************
> Note: This crash might not be reproducible with the provided testcase. That said, for the past 14 days, we've been seeing this crash frequently.
> 
> It may be possible to reproduce by trying the following options:
> - Run testcase multiple times for a longer duration.
> - Run fuzzing without testcase argument to hit the same crash signature.
> 
> If it still does not reproduce, try a speculative fix based on the crash stacktrace and verify if it works by looking at the crash statistics in the report. We will auto-close the bug if the crash is not seen for 14 days.
> ******************************************************************
> When you fix this bug, please
>   * mention the fix revision(s).
>   * state whether the bug was a short-lived regression or an old bug in any stable releases.
>   * add any other useful information.
> This information can help downstream consumers.
> 
> If you need to contact the OSS-Fuzz team with a question, concern, or any other feedback, please file an issue at https://github.com/google/oss-fuzz/issues. Comments on individual Monorail issues are not monitored.
> 


  reply	other threads:[~2023-09-07  9:38 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <0=71cc74a7ba1af446b7ed6b9a08b414d9=1491f90a54bd791097d19cec88a861b0=oss-fuzz@monorail-prod.appspotmail.com>
2023-09-06  5:01 ` ClusterFuzz-External via monorail
2023-09-07  9:38   ` Mark Wielaard [this message]
2023-09-07 12:31 ` evv… via monorail
2023-09-07 12:36   ` Mark Wielaard
2023-09-07 13:23 ` evv… via monorail
2023-09-07 14:25   ` Mark Wielaard
2023-09-11  7:42     ` Mark Wielaard
2023-09-20  7:52 ` ClusterFuzz-External via monorail
2023-09-20  7:52 ` ClusterFuzz-External via monorail

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=24426fdda75c3357ef3ac7c98e5eff3f3940fee7.camel@klomp.org \
    --to=mark@klomp.org \
    --cc=elfutils-devel@sourceware.org \
    --cc=evvers@ya.ru \
    --cc=monorail+v2.382749006@chromium.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).