Status: New
Owner: ----
CC:,,,,,,,,,,,, Labels: ClusterFuzz Stability-Memory-AddressSanitizer Reproducible Engine-libfuzzer Proj-llvm Security_Severity-High Reported-2019-04-14
Type: Bug-Security

New issue 14247 by ClusterFuzz-External: llvm/llvm-microsoft-demangle-fuzzer: Heap-buffer-overflow in llvm::ms_demangle::Node** llvm::ms_demangle::ArenaAllocator::allocArray<llvm::ms

Detailed report:

Project: llvm
Fuzzer: libFuzzer_llvm_llvm-microsoft-demangle-fuzzer
Fuzz target binary: llvm-microsoft-demangle-fuzzer
Job Type: libfuzzer_asan_llvm
Platform Id: linux

Crash Type: Heap-buffer-overflow WRITE {*}
Crash Address: 0x6210000bc900
Crash State:
llvm::ms_demangle::Node** llvm::ms_demangle::ArenaAllocator::allocArray<llvm::ms

Sanitizer: address (ASAN)

Recommended Security Severity: High


Reproducer Testcase:

Issue filed automatically.

See for instructions to reproduce this bug locally.

When you fix this bug, please
  * mention the fix revision(s).
* state whether the bug was a short-lived regression or an old bug in any stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any other feedback, please file an issue at

You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:

Reply to this email to add a comment.
llvm-bugs mailing list

Reply via email to