Detailed Report: https://oss-fuzz.com/testcase?key=5648135075659776
Project: wabt Fuzzing Engine: libFuzzer Fuzz Target: wasm2wat_fuzzer Job Type: libfuzzer_asan_i386_wabt Platform Id: linux
Crash Type: Heap-use-after-free READ 4 Crash Address: 0xec340814 Crash State: wabt::BinaryReaderIR::OnFunctionSymbol wabt::BinaryReader::ReadLinkingSection wabt::BinaryReader::ReadCustomSection
Sanitizer: address (ASAN)
Recommended Security Severity: High
Crash Revision: https://oss-fuzz.com/revisions?job=libfuzzer_asan_i386_wabt&revision=202004260345
Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=5648135075659776
Issue filed automatically.
See https://google.github.io/oss-fuzz/advanced-topics/reproducing for instructions to reproduce this bug locally.
**** UNREPRODUCIBLE **** Note: This crash might not be reproducible with the provided testcase. That said, for the past 14 days, we've been seeing this crash frequently.
It may be possible to reproduce by trying the following options: - Run testcase multiple times for a longer duration. - Run fuzzing without testcase argument to hit the same crash signature.
If it still does not reproduce, try a speculative fix based on the crash stacktrace and verify if it works by looking at the crash statistics in the report. We will auto-close the bug if the crash is not seen for 14 days.
When you fix this bug, please * mention the fix revision(s). * state whether the bug was a short-lived regression or an old bug in any stable releases. * add any other useful information. This information can help downstream consumers.
If you need to contact the OSS-Fuzz team with a question, concern, or any other feedback, please file an issue at https://github.com/google/oss-fuzz/issues. Comments on individual Monorail issues are not monitored.
This bug is subject to a 90 day disclosure deadline. If 90 days elapse without an upstream patch, then the bug report will automatically become visible to the public.