What is the integer overflow?
You will have to correctly copy-paste the full base64 input. Mutating the base64 inputs may result in a different fuzz input, which will trigger a different code path. Or it may be invalid base64. On your base64, I get:
To double check, if you correctly copy-paste the full input, you should get:
0$ sha1sum /tmp/b
16ef1eadaa3a1ad54365358b1ceb677bd1632396c /tmp/b
2$ sha256sum /tmp/b
3fa82e44660796a5196cfb05483cae34356e9a2c55aab79d59161c887d5f23b37 /tmp/b
4$ FUZZ=rpc UBSAN_OPTIONS="suppressions=$(pwd)/test/sanitizer_suppressions/ubsan:print_stacktrace=1:halt_on_error=1:report_error_type=1" ./src/test/fuzz/fuzz /tmp/b
5
6Executed /tmp/b in 3 ms
7
8or
9
10policy/feerate.cpp:29:63: runtime error: signed integer overflow: 1962496000000000 * 4714 cannot be represented in type 'int64_t' (aka 'long')