Skip to content

Instantly share code, notes, and snippets.

@Garbee
Created May 18, 2017 21:02
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save Garbee/c8cb01c7742dcf8819734b46021d9185 to your computer and use it in GitHub Desktop.
Save Garbee/c8cb01c7742dcf8819734b46021d9185 to your computer and use it in GitHub Desktop.
jonathan@office-desktop ~/C/c/src> ./out/asan/chrome
=================================================================
==24422==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020001c76da at pc 0x55c2e99696bb bp 0x7ffed4b5e950 sp 0x7ffed4b5e0f8
READ of size 11 at 0x6020001c76da thread T0 (chrome)
#0 0x55c2e99696ba (/home/jonathan/Code/chromium/src/out/asan/chrome+0x304c6ba)
#1 0x7f036e1ab130 (/usr/lib/x86_64-linux-gnu/libXcursor.so.1+0x6130)
0x6020001c76da is located 0 bytes to the right of 10-byte region [0x6020001c76d0,0x6020001c76da)
allocated by thread T0 (chrome) here:
#0 0x55c2e99f9af3 (/home/jonathan/Code/chromium/src/out/asan/chrome+0x30dcaf3)
#1 0x7f036e1aada8 (/usr/lib/x86_64-linux-gnu/libXcursor.so.1+0x5da8)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/jonathan/Code/chromium/src/out/asan/chrome+0x304c6ba)
Shadow bytes around the buggy address:
0x0c0480030e80: fa fa 00 fa fa fa 00 00 fa fa fd fd fa fa fd fd
0x0c0480030e90: fa fa fd fa fa fa fd fa fa fa fd fd fa fa 00 00
0x0c0480030ea0: fa fa 00 fa fa fa fd fa fa fa 00 00 fa fa 00 fa
0x0c0480030eb0: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa
0x0c0480030ec0: fa fa 00 fa fa fa 00 fa fa fa fd fd fa fa 00 00
=>0x0c0480030ed0: fa fa fd fa fa fa 00 00 fa fa 00[02]fa fa fa fa
0x0c0480030ee0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0480030ef0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0480030f00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0480030f10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0480030f20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==24422==ABORTING
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment