grok:grk_decompress_fuzzer: Heap-use-after-free in grk::t1_part1::T1Part1::postDecode

Type ossfuzz
Reporter Google
Modified 2020-10-21T18:52:42


Detailed Report:

Project: grok Fuzzing Engine: libFuzzer Fuzz Target: grk_decompress_fuzzer Job Type: libfuzzer_asan_grok Platform Id: linux

Crash Type: Heap-use-after-free READ 8 Crash Address: 0x607000016538 Crash State: grk::t1_part1::T1Part1::postDecode grk::T1Decoder::decompress grk::Tier1::decodeCodeblocks

Sanitizer: address (ASAN)

Recommended Security Severity: High

Crash Revision:

Reproducer Testcase:

Issue filed automatically.

See for instructions to reproduce this bug locally.

**** UNREPRODUCIBLE **** Note: This crash might not be reproducible with the provided testcase. That said, for the past 14 days, we've been seeing this crash frequently.

It may be possible to reproduce by trying the following options: - Run testcase multiple times for a longer duration. - Run fuzzing without testcase argument to hit the same crash signature.

If it still does not reproduce, try a speculative fix based on the crash stacktrace and verify if it works by looking at the crash statistics in the report. We will auto-close the bug if the crash is not seen for 14 days.

When you fix this bug, please * mention the fix revision(s). * state whether the bug was a short-lived regression or an old bug in any stable releases. * add any other useful information. This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any other feedback, please file an issue at Comments on individual Monorail issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse without an upstream patch, then the bug report will automatically become visible to the public.