envoy:server_fuzz_test: Heap-use-after-free in Envoy::Grpc::Internal::sendMessageUntyped
Discription

Project:
https://github.com/envoyproxy/envoy.git

Detailed Report: https://oss-fuzz.com/testcase?key=5723075140386816

Project: envoy
Fuzzing Engine: libFuzzer
Fuzz Target: server_fuzz_test
Job Type: libfuzzer_asan_envoy
Platform Id: linux

Crash Type: Heap-use-after-free READ 8
Crash Address: 0x618000006480
Crash State:
Envoy::Grpc::Internal::sendMessageUntyped
Envoy::Config::GrpcMuxImpl::sendDiscoveryRequest
Envoy::Config::GrpcMuxImpl::GrpcMuxWatchImpl::~GrpcMuxWatchImpl

Sanitizer: address (ASAN)

Recommended Security Severity: High

Regressed: https://oss-fuzz.com/revisions?job=libfuzzer_asan_envoy&range=201908212042:201909270241

Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=5723075140386816

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for instructions to reproduce this bug locally.
When you fix this bug, please
* mention the fix revision(s).
* state whether the bug was a short-lived regression or an old bug in any stable releases.
* add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any other feedback, please file an issue at https://github.com/google/oss-fuzz/issues. Comments on individual Monorail issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.Read More

Back to Main

Subscribe for the latest news: