-
-
Notifications
You must be signed in to change notification settings - Fork 45
Fuzzing #5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Sorry, but I'm not sure how to interpret the output you've given me. Could you perhaps give me some pointers? |
The input data might be a start. |
The output is mostly some error message of the address sanitizer. It claims to have detected a buffer overflow. I'm not an expert on its output. The basic idea is that it hijacks all allocations, adds a bit of padding and poisons these bytes to detect buffer overflows, use after free etc. For each 8 bytes in the address space there exists a shadow byte representing which of the 8 bytes have been poisoned. The shadow bytes are shown in the second part of the error message. The input data is an empty byte string, so this happens for the very first input. This and |
It looks to me like |
This is no longer reproducible. I tested with nightlies 2017-06-06 (crashes) and 2017-06-07 (works). From the discussion here: rust-lang/rust#39882 it seems like the correct date that it should have started to work. |
All righty then, closing! :-) (If anyone else has any other ideas or can reproduce it, please chime in and we can re-open.) |
I was trying to use
cargo fuzz
on rust-snappy using the following script:This resulted in the following output (probably a false positive):
The text was updated successfully, but these errors were encountered: