Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Exceeding the valid memory range while parsing the GIF file's background #62

Closed
tank0123 opened this issue Jul 12, 2021 · 0 comments
Closed

Comments

@tank0123
Copy link

I've attached the file. Please download and check the file.
2021-05-17-08_03_20_0x4c61b6c1_0xb1c1261c.zip

==49150==ERROR: LeakSanitizer: SEGV on unknown address 0x7ffff6320000 (pc 0x55555555b07e bp 0x7fffffff5820 sp 0x7fffffff57c0 T0)
==49150==The signal is caused by a WRITE memory access.
#0 0x55555555b07e in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:34
#1 0x55555555b07e in stbi__gif_load_next /home/ubuntu/tmp/catimg-2.7.0/src/stb_image.h:6581
#2 0x55555555b262 in stbi__xload_main /home/ubuntu/tmp/catimg-2.7.0/src/sh_image.c:29
#3 0x555555562cf4 in stbi__xload_main /home/ubuntu/tmp/catimg-2.7.0/src/sh_image.c:17
#4 0x555555562dc0 in stbi_xload /home/ubuntu/tmp/catimg-2.7.0/src/sh_image.c:106
#5 0x55555556309c in img_load_from_file /home/ubuntu/tmp/catimg-2.7.0/src/sh_image.c:202
#6 0x5555555565db in main /home/ubuntu/tmp/catimg-2.7.0/src/catimg.c:146
#7 0x7ffff73a30b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#8 0x5555555569bd in _start (/home/ubuntu/tmp/catimg-2.7.0/bin/catimg+0x29bd)

LeakSanitizer can not provide additional info.
SUMMARY: LeakSanitizer: SEGV /usr/include/x86_64-linux-gnu/bits/string_fortified.h:34 in memcpy

@posva posva closed this as not planned Won't fix, can't repro, duplicate, stale Apr 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants