==100398==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61200000044b at pc 0x0000004adb12 bp 0x7ffd1d319ef0 sp 0x7ffd1d3196a0 READ of size4294967295 at 0x61200000044b thread T0 #00x4adb11 in __asan_memcpy (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4adb11) #10x6b53ed (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b53ed) #20x6b6b99 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b6b99) #30x5265aa (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5265aa) #40x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #50x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #60x7f6a7f4b6c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #70x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x61200000044b is located 0 bytes to the right of 267-byte region [0x612000000340,0x61200000044b) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b69c5 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b69c5) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f6a7f4b6c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4adb11) in __asan_memcpy Shadow bytes around the buggy address: 0x0c247fff8030: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff8040: 00000000000000000000000000000000 0x0c247fff8050: 00000000000000000000 fa fa fa fa fa fa 0x0c247fff8060: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff8070: 00000000000000000000000000000000 =>0x0c247fff8080: 000000000000000000[03]fa fa fa fa fa fa 0x0c247fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==100398==ABORTING
================================================================= ==111746==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61200000044b at pc 0x0000006b5590 bp 0x7ffe3afb4690 sp 0x7ffe3afb4688 READ of size1 at 0x61200000044b thread T0 #00x6b558f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b558f) #10x6b6bf3 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b6bf3) #20x5265aa (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5265aa) #30x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #40x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #50x7ff49f52ec86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #60x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x61200000044b is located 0 bytes to the right of 267-byte region [0x612000000340,0x61200000044b) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b69c5 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b69c5) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7ff49f52ec86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b558f) Shadow bytes around the buggy address: 0x0c247fff8030: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff8040: 00000000000000000000000000000000 0x0c247fff8050: 00000000000000000000 fa fa fa fa fa fa 0x0c247fff8060: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff8070: 00000000000000000000000000000000 =>0x0c247fff8080: 000000000000000000[03]fa fa fa fa fa fa 0x0c247fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==111746==ABORTING
================================================================= ==117024==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x616000000832 at pc 0x0000006e7e3e bp 0x7ffc23d9f1a0 sp 0x7ffc23d9f198 READ of size1 at 0x616000000832 thread T0 #00x6e7e3d (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e7e3d) #10x5eb58a (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5eb58a) #20x4fe227 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe227) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7fcd6ac0dc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x616000000832 is located 680 bytes to the right of 522-byte region [0x616000000380,0x61600000058a) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x4fa78f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fa78f) #20x4f9a31 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f9a31) #30x4f55dc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f55dc) #40x7fcd6ac0dc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e7e3d) Shadow bytes around the buggy address: 0x0c2c7fff80b0: 0002 fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c2c7fff8100: fa fa fa fa fa fa[fa]fa fa fa fa fa fa fa fa fa 0x0c2c7fff8110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==117024==ABORTING
==106716==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x616000000837 at pc 0x0000006e1fc9 bp 0x7fff2058d3a0 sp 0x7fff2058d398 READ of size1 at 0x616000000837 thread T0 #00x6e1fc8 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e1fc8) #10x5eb5ec (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5eb5ec) #20x4fe227 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe227) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7fdfdc8c8c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x616000000837 is located 685 bytes to the right of 522-byte region [0x616000000380,0x61600000058a) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x4fa78f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fa78f) #20x4f9a31 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f9a31) #30x4f55dc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f55dc) #40x7fdfdc8c8c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e1fc8) Shadow bytes around the buggy address: 0x0c2c7fff80b0: 0002 fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c2c7fff8100: fa fa fa fa fa fa[fa]fa fa fa fa fa fa fa fa fa 0x0c2c7fff8110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==106716==ABORTING
================================================================= ==107908==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6120000005cb at pc 0x0000006b5568 bp 0x7ffc8bfccd30 sp 0x7ffc8bfccd28 READ of size1 at 0x6120000005cb thread T0 #00x6b5567 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b5567) #10x6b6b99 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b6b99) #20x5265aa (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5265aa) #30x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #40x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #50x7fc74767cc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #60x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x6120000005cb is located 0 bytes to the right of 267-byte region [0x6120000004c0,0x6120000005cb) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b69c5 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b69c5) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7fc74767cc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b5567) Shadow bytes around the buggy address: 0x0c247fff8060: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff8070: 00000000000000000000000000000000 0x0c247fff8080: 0000000000000000000000000000 fa fa 0x0c247fff8090: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff80a0: 00000000000000000000000000000000 =>0x0c247fff80b0: 000000000000000000[03]fa fa fa fa fa fa 0x0c247fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff8100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==107908==ABORTING
==108759==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x612000000616 at pc 0x0000006b064e bp 0x7ffe8ca033c0 sp 0x7ffe8ca033b8 READ of size1 at 0x612000000616 thread T0 #00x6b064d (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b064d) #10x6b256a (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b256a) #20x6b74c0 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b74c0) #30x5265aa (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5265aa) #40x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #50x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #60x7f93b614bc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #70x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x612000000616 is located 75 bytes to the right of 267-byte region [0x6120000004c0,0x6120000005cb) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b69c5 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b69c5) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f93b614bc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b064d) Shadow bytes around the buggy address: 0x0c247fff8070: 00000000000000000000000000000000 0x0c247fff8080: 0000000000000000000000000000 fa fa 0x0c247fff8090: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff80a0: 00000000000000000000000000000000 0x0c247fff80b0: 00000000000000000003 fa fa fa fa fa fa =>0x0c247fff80c0: fa fa[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff8100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff8110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==108759==ABORTING
==109163==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6120000008bd at pc 0x0000006adb1f bp 0x7ffcefac54e0 sp 0x7ffcefac54d8 READ of size1 at 0x6120000008bd thread T0 #00x6adb1e (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6adb1e) #10x6b71de (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b71de) #20x5265aa (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5265aa) #30x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #40x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #50x7f199d870c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #60x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x6120000008bd is located 754 bytes to the right of 267-byte region [0x6120000004c0,0x6120000005cb) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b69c5 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b69c5) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f199d870c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6adb1e) Shadow bytes around the buggy address: 0x0c247fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff8100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c247fff8110: fa fa fa fa fa fa fa[fa]fa fa fa fa fa fa fa fa 0x0c247fff8120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff8130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff8140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff8150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff8160: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==109163==ABORTING
==109553==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6160000078a6 at pc 0x0000006e20a1 bp 0x7fffa376ea60 sp 0x7fffa376ea58 READ of size1 at 0x6160000078a6 thread T0 #00x6e20a0 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e20a0) #10x5eb5ec (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5eb5ec) #20x4fe227 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe227) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f2da0c05c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
Address 0x6160000078a6 is a wild pointer. SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e20a0) Shadow bytes around the buggy address: 0x0c2c7fff8ec0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8ed0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8ee0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8ef0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8f00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c2c7fff8f10: fa fa fa fa[fa]fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8f20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8f30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8f40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8f50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8f60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==109553==ABORTING
==109939==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000001d6 at pc 0x0000005e15d9 bp 0x7ffcc21c17b0 sp 0x7ffcc21c17a8 READ of size1 at 0x6020000001d6 thread T0 #00x5e15d8 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5e15d8) #10x4fe1e2 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe1e2) #20x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #30x7f502f9c0c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #40x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x6020000001d6 is located 0 bytes to the right of 6-byte region [0x6020000001d0,0x6020000001d6) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x4fa78f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fa78f) #20x4f9a31 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f9a31) #30x4f55dc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f55dc) #40x7f502f9c0c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5e15d8) Shadow bytes around the buggy address: 0x0c047fff7fe0: 00000000000000000000000000000000 0x0c047fff7ff0: 00000000000000000000000000000000 0x0c047fff8000: fa fa 0000 fa fa 0003 fa fa fd fa fa fa 0003 0x0c047fff8010: fa fa fd fa fa fa 0000 fa fa fd fa fa fa fd fa 0x0c047fff8020: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047fff8030: fa fa 04 fa fa fa 00 fa fa fa[06]fa fa fa fd fa 0x0c047fff8040: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047fff8050: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047fff8060: fa fa fd fa fa fa 0000 fa fa fa fa fa fa fa fa 0x0c047fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==109939==ABORTING
==110431==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61200000044b at pc 0x0000006b55a0 bp 0x7ffc11ba6f90 sp 0x7ffc11ba6f88 READ of size1 at 0x61200000044b thread T0 #00x6b559f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b559f) #10x6b6d86 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b6d86) #20x5265aa (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5265aa) #30x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #40x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #50x7f17f472ec86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #60x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x61200000044b is located 0 bytes to the right of 267-byte region [0x612000000340,0x61200000044b) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b69c5 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b69c5) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f17f472ec86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b559f) Shadow bytes around the buggy address: 0x0c247fff8030: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff8040: 00000000000000000000000000000000 0x0c247fff8050: 00000000000000000000 fa fa fa fa fa fa 0x0c247fff8060: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff8070: 00000000000000000000000000000000 =>0x0c247fff8080: 000000000000000000[03]fa fa fa fa fa fa 0x0c247fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==110431==ABORTING
==110920==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6120000005cb at pc 0x0000006b0b2d bp 0x7ffe5e1f57e0 sp 0x7ffe5e1f57d8 READ of size1 at 0x6120000005cb thread T0 #00x6b0b2c (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b0b2c) #10x6b256a (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b256a) #20x6b74c0 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b74c0) #30x5265aa (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5265aa) #40x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #50x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #60x7f857d9cac86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #70x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x6120000005cb is located 0 bytes to the right of 267-byte region [0x6120000004c0,0x6120000005cb) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b69c5 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b69c5) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f857d9cac86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b0b2c) Shadow bytes around the buggy address: 0x0c247fff8060: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff8070: 00000000000000000000000000000000 0x0c247fff8080: 0000000000000000000000000000 fa fa 0x0c247fff8090: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff80a0: 00000000000000000000000000000000 =>0x0c247fff80b0: 000000000000000000[03]fa fa fa fa fa fa 0x0c247fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff8100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==110920==ABORTING
==112565==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x608000000178 at pc 0x0000006b05ab bp 0x7fff844968e0 sp 0x7fff844968d8 READ of size1 at 0x608000000178 thread T0 #00x6b05aa (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b05aa) #10x6b99ca (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b99ca) #20x527687 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x527687) #30x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #40x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #50x7f1fc338fc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #60x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x608000000178 is located 0 bytes to the right of 88-byte region [0x608000000120,0x608000000178) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b536b (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b536b)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b05aa) Shadow bytes around the buggy address: 0x0c107fff7fd0: 00000000000000000000000000000000 0x0c107fff7fe0: 00000000000000000000000000000000 0x0c107fff7ff0: 00000000000000000000000000000000 0x0c107fff8000: fa fa fa fa 000000000000000000000000 0x0c107fff8010: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd =>0x0c107fff8020: fa fa fa fa 0000000000000000000000[fa] 0x0c107fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c107fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c107fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c107fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c107fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==112565==ABORTING
==112975==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6120000005cb at pc 0x0000006b55b0 bp 0x7ffce76ca210 sp 0x7ffce76ca208 READ of size1 at 0x6120000005cb thread T0 #00x6b55af (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b55af) #10x6b6b99 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b6b99) #20x5265aa (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5265aa) #30x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #40x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #50x7fc4b3c13c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #60x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x6120000005cb is located 0 bytes to the right of 267-byte region [0x6120000004c0,0x6120000005cb) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b69c5 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b69c5) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7fc4b3c13c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b55af) Shadow bytes around the buggy address: 0x0c247fff8060: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff8070: 00000000000000000000000000000000 0x0c247fff8080: 0000000000000000000000000000 fa fa 0x0c247fff8090: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff80a0: 00000000000000000000000000000000 =>0x0c247fff80b0: 000000000000000000[03]fa fa fa fa fa fa 0x0c247fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff8100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==112975==ABORTING
==113407==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f18b85fb808 at pc 0x0000006c08a7 bp 0x7ffe5e50c390 sp 0x7ffe5e50c388 READ of size8 at 0x7f18b85fb808 thread T0 #00x6c08a6 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6c08a6) #10x527687 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x527687) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f18bbbcac86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x7f18b85fb808 is located 8 bytes to the right of 1048576-byte region [0x7f18b84fb800,0x7f18b85fb800) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x526fd2 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x526fd2) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f18bbbcac86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6c08a6) Shadow bytes around the buggy address: 0x0fe3970b76b0: 00000000000000000000000000000000 0x0fe3970b76c0: 00000000000000000000000000000000 0x0fe3970b76d0: 00000000000000000000000000000000 0x0fe3970b76e0: 00000000000000000000000000000000 0x0fe3970b76f0: 00000000000000000000000000000000 =>0x0fe3970b7700: fa[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe3970b7710: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe3970b7720: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe3970b7730: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe3970b7740: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe3970b7750: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==113407==ABORTING
================================================================= ==113825==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6120000005cb at pc 0x0000006b84b2 bp 0x7fff0ff32f60 sp 0x7fff0ff32f58 READ of size1 at 0x6120000005cb thread T0 #00x6b84b1 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b84b1) #10x5265aa (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5265aa) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f8d208dcc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x6120000005cb is located 0 bytes to the right of 267-byte region [0x6120000004c0,0x6120000005cb) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b69c5 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b69c5) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f8d208dcc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b84b1) Shadow bytes around the buggy address: 0x0c247fff8060: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff8070: 00000000000000000000000000000000 0x0c247fff8080: 0000000000000000000000000000 fa fa 0x0c247fff8090: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff80a0: 00000000000000000000000000000000 =>0x0c247fff80b0: 000000000000000000[03]fa fa fa fa fa fa 0x0c247fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff8100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==113825==ABORTING
==114199==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000295 at pc 0x0000006b03b6 bp 0x7ffd165c5be0 sp 0x7ffd165c5bd8 READ of size1 at 0x603000000295 thread T0 #00x6b03b5 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b03b5) #10x6b99ca (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b99ca) #20x527687 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x527687) #30x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #40x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #50x7f60e4d53c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #60x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x603000000295 is located 0 bytes to the right of 21-byte region [0x603000000280,0x603000000295) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b536b (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b536b)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b03b5) Shadow bytes around the buggy address: 0x0c067fff8000: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd 0x0c067fff8010: fd fa fa fa 000000 fa fa fa 000000 fa fa fa 0x0c067fff8020: 00000004 fa fa 00000000 fa fa fd fd fd fa 0x0c067fff8030: fa fa fd fd fd fa fa fa 000006 fa fa fa fd fd 0x0c067fff8040: fd fa fa fa 00000000 fa fa fd fd fd fa fa fa =>0x0c067fff8050: 0000[05]fa fa fa 000000 fa fa fa fa fa fa fa 0x0c067fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==114199==ABORTING
==114606==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x608000000178 at pc 0x0000006b04df bp 0x7ffea78df980 sp 0x7ffea78df978 READ of size1 at 0x608000000178 thread T0 #00x6b04de (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b04de) #10x6b99ca (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b99ca) #20x527687 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x527687) #30x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #40x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #50x7ff6deb1dc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #60x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x608000000178 is located 0 bytes to the right of 88-byte region [0x608000000120,0x608000000178) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b536b (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b536b)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b04de) Shadow bytes around the buggy address: 0x0c107fff7fd0: 00000000000000000000000000000000 0x0c107fff7fe0: 00000000000000000000000000000000 0x0c107fff7ff0: 00000000000000000000000000000000 0x0c107fff8000: fa fa fa fa 000000000000000000000000 0x0c107fff8010: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd =>0x0c107fff8020: fa fa fa fa 0000000000000000000000[fa] 0x0c107fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c107fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c107fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c107fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c107fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==114606==ABORTING
==114999==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000519 at pc 0x0000006b0467 bp 0x7ffcbfdbda40 sp 0x7ffcbfdbda38 READ of size1 at 0x602000000519 thread T0 #00x6b0466 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b0466) #10x6b99ca (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b99ca) #20x527687 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x527687) #30x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #40x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #50x7fc6f9544c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #60x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x602000000519 is located 0 bytes to the right of 9-byte region [0x602000000510,0x602000000519) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b536b (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b536b)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b0466) Shadow bytes around the buggy address: 0x0c047fff8050: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047fff8060: fa fa fd fa fa fa 0000 fa fa 07 fa fa fa 00 fa 0x0c047fff8070: fa fa 07 fa fa fa 07 fa fa fa 07 fa fa fa 00 fa 0x0c047fff8080: fa fa 07 fa fa fa 07 fa fa fa 0000 fa fa 00 fa 0x0c047fff8090: fa fa 05 fa fa fa 00 fa fa fa 0000 fa fa 0004 =>0x0c047fff80a0: fa fa 00[01]fa fa 02 fa fa fa 0001 fa fa 07 fa 0x0c047fff80b0: fa fa 07 fa fa fa 00 fa fa fa 07 fa fa fa 0000 0x0c047fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==114999==ABORTING
==115405==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6070000000e0 at pc 0x000000617088 bp 0x7ffc10142fb0 sp 0x7ffc10142fa8 READ of size 1 at 0x6070000000e0 thread T0 #0 0x617087 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x617087) #1 0x4feb66 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4feb66) #2 0x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #3 0x7f93e83b7c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #4 0x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x6070000000e0 is located 0 bytes to the right of 80-byte region [0x607000000090,0x6070000000e0) allocated by thread T0 here: #0 0x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #1 0x4fa78f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fa78f) #2 0x4f9a31 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f9a31) #3 0x4f55dc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f55dc) #4 0x7f93e83b7c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x617087) Shadow bytes around the buggy address: 0x0c0e7fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c0e7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c0e7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c0e7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c0e7fff8000: fa fa fa fa 00 00 00 00 00 00 00 00 04 fa fa fa =>0x0c0e7fff8010: fa fa 00 00 00 00 00 00 00 00 00 00[fa]fa fa fa 0x0c0e7fff8020: 00 00 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 0x0c0e7fff8030: 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 00 00 0x0c0e7fff8040: 00 00 00 00 00 00 fa fa fa fa 00 00 00 00 00 00 0x0c0e7fff8050: 00 00 00 fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c0e7fff8060: fd fa fa fa fa fa 00 00 00 00 00 00 00 00 00 fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==115405==ABORTING
==115805==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6140000003cd at pc 0x0000006b0d64 bp 0x7ffc373add70 sp 0x7ffc373add68 READ of size1 at 0x6140000003cd thread T0 #00x6b0d63 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b0d63) #10x6b256a (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b256a) #20x6b74c0 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b74c0) #30x5265aa (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5265aa) #40x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #50x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #60x7f3e2b577c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #70x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x6140000003cd is located 0 bytes to the right of 397-byte region [0x614000000240,0x6140000003cd) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b69c5 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b69c5) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f3e2b577c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b0d63) Shadow bytes around the buggy address: 0x0c287fff8020: 00000000000000000000000000000000 0x0c287fff8030: 00000000000000000005 fa fa fa fa fa fa 0x0c287fff8040: fa fa fa fa fa fa fa fa 0000000000000000 0x0c287fff8050: 00000000000000000000000000000000 0x0c287fff8060: 00000000000000000000000000000000 =>0x0c287fff8070: 000000000000000000[05]fa fa fa fa fa fa 0x0c287fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c287fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c287fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c287fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c287fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==115805==ABORTING
==116203==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6070000000e0 at pc 0x000000617320 bp 0x7ffdf3399810 sp 0x7ffdf3399808 READ of size 1 at 0x6070000000e0 thread T0 #0 0x61731f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x61731f) #1 0x4feb66 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4feb66) #2 0x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #3 0x7f448d7ccc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #4 0x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x6070000000e0 is located 0 bytes to the right of 80-byte region [0x607000000090,0x6070000000e0) allocated by thread T0 here: #0 0x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #1 0x4fa78f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fa78f) #2 0x4f9a31 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f9a31) #3 0x4f55dc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f55dc) #4 0x7f448d7ccc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x61731f) Shadow bytes around the buggy address: 0x0c0e7fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c0e7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c0e7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c0e7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c0e7fff8000: fa fa fa fa 00 00 00 00 00 00 00 00 04 fa fa fa =>0x0c0e7fff8010: fa fa 00 00 00 00 00 00 00 00 00 00[fa]fa fa fa 0x0c0e7fff8020: 00 00 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 0x0c0e7fff8030: 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 00 00 0x0c0e7fff8040: 00 00 00 00 00 00 fa fa fa fa 00 00 00 00 00 00 0x0c0e7fff8050: 00 00 00 fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c0e7fff8060: fd fa fa fa fa fa 00 00 00 00 00 00 00 00 00 fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==116203==ABORTING
==116615==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000150 at pc 0x0000006171b3 bp 0x7ffccb343290 sp 0x7ffccb343288 READ of size1 at 0x603000000150 thread T0 #00x6171b2 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6171b2) #10x4febdc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4febdc) #20x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #30x7f9e1c28bc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #40x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x603000000150 is located 0 bytes to the right of 32-byte region [0x603000000130,0x603000000150) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x4fa78f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fa78f) #20x4f9a31 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f9a31) #30x4f55dc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f55dc) #40x7f9e1c28bc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6171b2) Shadow bytes around the buggy address: 0x0c067fff7fd0: 00000000000000000000000000000000 0x0c067fff7fe0: 00000000000000000000000000000000 0x0c067fff7ff0: 00000000000000000000000000000000 0x0c067fff8000: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd 0x0c067fff8010: fd fa fa fa 000000 fa fa fa 000000 fa fa fa =>0x0c067fff8020: 00000004 fa fa 00000000[fa]fa 000004 fa 0x0c067fff8030: fa fa 00000000 fa fa fd fd fd fa fa fa fd fd 0x0c067fff8040: fd fa fa fa 000006 fa fa fa fd fd fd fa fa fa 0x0c067fff8050: 000000 fa fa fa fd fd fd fd fa fa 000002 fa 0x0c067fff8060: fa fa 000002 fa fa fa 000002 fa fa fa 0000 0x0c067fff8070: 02 fa fa fa 000002 fa fa fa 000002 fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==116615==ABORTING
==101583==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6100000000f3 at pc 0x0000006b0479 bp 0x7ffcfed95d00 sp 0x7ffcfed95cf8 READ of size1 at 0x6100000000f3 thread T0 #00x6b0478 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b0478) #10x6b99ca (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b99ca) #20x527687 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x527687) #30x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #40x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #50x7f173ed37c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #60x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x6100000000f3 is located 0 bytes to the right of 179-byte region [0x610000000040,0x6100000000f3) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b536b (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b536b)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b0478) Shadow bytes around the buggy address: 0x0c207fff7fc0: 00000000000000000000000000000000 0x0c207fff7fd0: 00000000000000000000000000000000 0x0c207fff7fe0: 00000000000000000000000000000000 0x0c207fff7ff0: 00000000000000000000000000000000 0x0c207fff8000: fa fa fa fa fa fa fa fa 0000000000000000 =>0x0c207fff8010: 0000000000000000000000000000[03]fa 0x0c207fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==101583==ABORTING
==102014==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f3d201e5808 at pc 0x0000006c0474 bp 0x7ffde85a7bb0 sp 0x7ffde85a7ba8 READ of size8 at 0x7f3d201e5808 thread T0 #00x6c0473 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6c0473) #10x527687 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x527687) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f3d24357c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x7f3d201e5808 is located 8 bytes to the right of 1048576-byte region [0x7f3d200e5800,0x7f3d201e5800) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x526fd2 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x526fd2) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f3d24357c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6c0473) Shadow bytes around the buggy address: 0x0fe824034ab0: 00000000000000000000000000000000 0x0fe824034ac0: 00000000000000000000000000000000 0x0fe824034ad0: 00000000000000000000000000000000 0x0fe824034ae0: 00000000000000000000000000000000 0x0fe824034af0: 00000000000000000000000000000000 =>0x0fe824034b00: fa[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe824034b10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe824034b20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe824034b30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe824034b40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe824034b50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==102014==ABORTING
==102472==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fa28a7e5808 at pc 0x0000006c0415 bp 0x7ffe8b844290 sp 0x7ffe8b844288 READ of size8 at 0x7fa28a7e5808 thread T0 #00x6c0414 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6c0414) #10x527687 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x527687) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7fa28e8f7c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x7fa28a7e5808 is located 8 bytes to the right of 1048576-byte region [0x7fa28a6e5800,0x7fa28a7e5800) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x526fd2 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x526fd2) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7fa28e8f7c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6c0414) Shadow bytes around the buggy address: 0x0ff4d14f4ab0: 00000000000000000000000000000000 0x0ff4d14f4ac0: 00000000000000000000000000000000 0x0ff4d14f4ad0: 00000000000000000000000000000000 0x0ff4d14f4ae0: 00000000000000000000000000000000 0x0ff4d14f4af0: 00000000000000000000000000000000 =>0x0ff4d14f4b00: fa[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff4d14f4b10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff4d14f4b20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff4d14f4b30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff4d14f4b40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff4d14f4b50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==102472==ABORTING
==102877==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000000418 at pc 0x0000006b05cf bp 0x7ffe00e2fc60 sp 0x7ffe00e2fc58 READ of size1 at 0x619000000418 thread T0 #00x6b05ce (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b05ce) #10x6b99ca (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b99ca) #20x527687 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x527687) #30x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #40x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #50x7fb14c4a8c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #60x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x619000000418 is located 0 bytes to the right of 920-byte region [0x619000000080,0x619000000418) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b536b (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b536b)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b05ce) Shadow bytes around the buggy address: 0x0c327fff8030: 00000000000000000000000000000000 0x0c327fff8040: 00000000000000000000000000000000 0x0c327fff8050: 00000000000000000000000000000000 0x0c327fff8060: 00000000000000000000000000000000 0x0c327fff8070: 00000000000000000000000000000000 =>0x0c327fff8080: 000000[fa]fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff80b0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c327fff80c0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c327fff80d0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==102877==ABORTING
==103532==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f98ea3af808 at pc 0x0000006c0a33 bp 0x7ffcdefa80f0 sp 0x7ffcdefa80e8 READ of size8 at 0x7f98ea3af808 thread T0 #00x6c0a32 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6c0a32) #10x527687 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x527687) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f98f803ec86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x7f98ea3af808 is located 8 bytes to the right of 1048576-byte region [0x7f98ea2af800,0x7f98ea3af800) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x526fd2 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x526fd2) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f98f803ec86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6c0a32) Shadow bytes around the buggy address: 0x0ff39d46deb0: 00000000000000000000000000000000 0x0ff39d46dec0: 00000000000000000000000000000000 0x0ff39d46ded0: 00000000000000000000000000000000 0x0ff39d46dee0: 00000000000000000000000000000000 0x0ff39d46def0: 00000000000000000000000000000000 =>0x0ff39d46df00: fa[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff39d46df10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff39d46df20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff39d46df30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff39d46df40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff39d46df50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==103532==ABORTING
==104121==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x617000007110 at pc 0x0000006c0bc4 bp 0x7ffc16d4ecb0 sp 0x7ffc16d4eca8 READ of size4 at 0x617000007110 thread T0 #00x6c0bc3 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6c0bc3) #10x6baee8 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6baee8) #20x527687 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x527687) #30x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #40x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #50x7f987337ac86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #60x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x617000007110 is located 392 bytes to the right of 648-byte region [0x617000006d00,0x617000006f88) freed by thread T0 here: #00x4aeea8 in realloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aeea8) #10x5add31 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5add31) #20x540f73 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x540f73) #30x6bc059 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6bc059) #40x6baee8 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6baee8) #50x6baee8 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6baee8) #60x527687 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x527687) #70x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #80x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #90x7f987337ac86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
previously allocated by thread T0 here: #00x4aeea8 in realloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aeea8) #10x5add31 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5add31) #20x540696 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x540696) #30x6bda43 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6bda43) #40x527687 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x527687) #50x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #60x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #70x7f987337ac86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6c0bc3) Shadow bytes around the buggy address: 0x0c2e7fff8dd0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c2e7fff8de0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c2e7fff8df0: fd fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2e7fff8e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2e7fff8e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c2e7fff8e20: fa fa[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2e7fff8e30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2e7fff8e40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2e7fff8e50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2e7fff8e60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2e7fff8e70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==104121==ABORTING
==104506==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60800000017a at pc 0x0000006e412b bp 0x7fff3383d690 sp 0x7fff3383d688 WRITE of size1 at 0x60800000017a thread T0 #00x6e412a (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e412a) #10x59ab0f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x59ab0f) #20x4fbe96 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fbe96) #30x4f5932 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5932) #40x7f034a2f9c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x60800000017a is located 0 bytes to the right of 90-byte region [0x608000000120,0x60800000017a) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6e3519 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e3519) #20x59ab0f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x59ab0f)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e412a) Shadow bytes around the buggy address: 0x0c107fff7fd0: 00000000000000000000000000000000 0x0c107fff7fe0: 00000000000000000000000000000000 0x0c107fff7ff0: 00000000000000000000000000000000 0x0c107fff8000: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c107fff8010: fa fa fa fa 000000000000000000000001 =>0x0c107fff8020: fa fa fa fa 0000000000000000000000[02] 0x0c107fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c107fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c107fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c107fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c107fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==104506==ABORTING
==104877==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60b000000db3 at pc 0x0000004adcdc bp 0x7fff70fd6650 sp 0x7fff70fd5e00 WRITE of size176 at 0x60b000000db3 thread T0 #00x4adcdb in __asan_memset (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4adcdb) #10x5cd359 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5cd359) #20x4fea8d (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fea8d) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f604b90ec86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x60b000000db3 is located 0 bytes to the right of 99-byte region [0x60b000000d50,0x60b000000db3) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x5cd14f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5cd14f) #20x4fea8d (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fea8d) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f604b90ec86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4adcdb) in __asan_memset Shadow bytes around the buggy address: 0x0c167fff8160: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c167fff8170: fd fd fd fd fd fa fa fa fa fa fa fa fa fa fd fd 0x0c167fff8180: fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa 0x0c167fff8190: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c167fff81a0: fd fa fa fa fa fa fa fa fa fa 000000000000 =>0x0c167fff81b0: 000000000000[03]fa fa fa fa fa fa fa fa fa 0x0c167fff81c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c167fff81d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c167fff81e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c167fff81f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c167fff8200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==104877==ABORTING
==105392==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000030bc3 at pc 0x0000006e41a9 bp 0x7ffe6221d370 sp 0x7ffe6221d368 WRITE of size1 at 0x611000030bc3 thread T0 #00x6e41a8 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e41a8) #10x5bea45 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5bea45) #20x4fbdd4 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fbdd4) #30x4f5932 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5932) #40x7f34f993dc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x611000030bc3 is located 0 bytes to the right of 195-byte region [0x611000030b00,0x611000030bc3) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6e3519 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e3519) #20x5bea45 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5bea45)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e41a8) Shadow bytes around the buggy address: 0x0c227fffe120: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fa 0x0c227fffe130: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c227fffe140: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c227fffe150: fd fd fd fd fd fa fa fa fa fa fa fa fa fa fa fa 0x0c227fffe160: 00000000000000000000000000000000 =>0x0c227fffe170: 0000000000000000[03]fa fa fa fa fa fa fa 0x0c227fffe180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fffe190: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fffe1a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fffe1b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fffe1c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==105392==ABORTING
==105898==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x616000000ec2 at pc 0x0000006e41b1 bp 0x7ffef23bfd70 sp 0x7ffef23bfd68 WRITE of size1 at 0x616000000ec2 thread T0 #00x6e41b0 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e41b0) #10x59ab0f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x59ab0f) #20x4fbe60 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fbe60) #30x4f5932 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5932) #40x7fd2baafcc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x616000000ec2 is located 0 bytes to the right of 578-byte region [0x616000000c80,0x616000000ec2) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6e3519 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e3519) #20x59ab0f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x59ab0f)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e41b0) Shadow bytes around the buggy address: 0x0c2c7fff8180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8190: 00000000000000000000000000000000 0x0c2c7fff81a0: 00000000000000000000000000000000 0x0c2c7fff81b0: 00000000000000000000000000000000 0x0c2c7fff81c0: 00000000000000000000000000000000 =>0x0c2c7fff81d0: 0000000000000000[02]fa fa fa fa fa fa fa 0x0c2c7fff81e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff81f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8210: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8220: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==105898==ABORTING
==106312==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x616000000ec2 at pc 0x0000006e41b9 bp 0x7fff002486b0 sp 0x7fff002486a8 WRITE of size1 at 0x616000000ec2 thread T0 #00x6e41b8 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e41b8) #10x59ab0f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x59ab0f) #20x4fbe60 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fbe60) #30x4f5932 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5932) #40x7f5a9e97cc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x616000000ec2 is located 0 bytes to the right of 578-byte region [0x616000000c80,0x616000000ec2) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6e3519 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e3519) #20x59ab0f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x59ab0f)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e41b8) Shadow bytes around the buggy address: 0x0c2c7fff8180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8190: 00000000000000000000000000000000 0x0c2c7fff81a0: 00000000000000000000000000000000 0x0c2c7fff81b0: 00000000000000000000000000000000 0x0c2c7fff81c0: 00000000000000000000000000000000 =>0x0c2c7fff81d0: 0000000000000000[02]fa fa fa fa fa fa fa 0x0c2c7fff81e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff81f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8210: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8220: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==106312==ABORTING
==107115==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60e00000037b at pc 0x0000006e420e bp 0x7ffcd59ed9f0 sp 0x7ffcd59ed9e8 WRITE of size1 at 0x60e00000037b thread T0 #00x6e420d (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e420d) #10x59ab0f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x59ab0f) #20x4fbe96 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fbe96) #30x4f5932 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5932) #40x7f3dd47a6c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x60e00000037b is located 0 bytes to the right of 155-byte region [0x60e0000002e0,0x60e00000037b) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6e3519 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e3519) #20x59ab0f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x59ab0f)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6e420d) Shadow bytes around the buggy address: 0x0c1c7fff8010: fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa 0x0c1c7fff8020: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c1c7fff8030: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa 0x0c1c7fff8040: 00000000000000000000000000000000 0x0c1c7fff8050: 00000002 fa fa fa fa fa fa fa fa 00000000 =>0x0c1c7fff8060: 000000000000000000000000000000[03] 0x0c1c7fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1c7fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1c7fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1c7fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1c7fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==107115==ABORTING
==107517==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61b000000660 at pc 0x00000065fc98 bp 0x7ffe7eb24290 sp 0x7ffe7eb24288 READ of size1 at 0x61b000000660 thread T0 #00x65fc97 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x65fc97) #10x4fe89d (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe89d) #20x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #30x7fe052acac86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #40x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x61b000000660 is located 0 bytes to the right of 1504-byte region [0x61b000000080,0x61b000000660) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x4fa78f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fa78f) #20x4f9a31 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f9a31) #30x4f55dc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f55dc) #40x7fe052acac86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x65fc97) Shadow bytes around the buggy address: 0x0c367fff8070: 00000000000000000000000000000000 0x0c367fff8080: 00000000000000000000000000000000 0x0c367fff8090: 00000000000000000000000000000000 0x0c367fff80a0: 00000000000000000000000000000000 0x0c367fff80b0: 00000000000000000000000000000000 =>0x0c367fff80c0: 000000000000000000000000[fa]fa fa fa 0x0c367fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fff8100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fff8110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==107517==ABORTING
==108318==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6120000005cb at pc 0x0000006b544f bp 0x7ffe3ffce110 sp 0x7ffe3ffce108 READ of size1 at 0x6120000005cb thread T0 #00x6b544e (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b544e) #10x6b6bf3 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b6bf3) #20x5265aa (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5265aa) #30x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #40x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #50x7f0873f24c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #60x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
0x6120000005cb is located 0 bytes to the right of 267-byte region [0x6120000004c0,0x6120000005cb) allocated by thread T0 here: #00x4aecd8 in calloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4aecd8) #10x6b69c5 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b69c5) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f0873f24c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b544e) Shadow bytes around the buggy address: 0x0c247fff8060: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff8070: 00000000000000000000000000000000 0x0c247fff8080: 0000000000000000000000000000 fa fa 0x0c247fff8090: fa fa fa fa fa fa fa fa 0000000000000000 0x0c247fff80a0: 00000000000000000000000000000000 =>0x0c247fff80b0: 000000000000000000[03]fa fa fa fa fa fa 0x0c247fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff8100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01020304050607 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==108318==ABORTING
catalogue 2: Vulnerability type – global heap buffer overflow
AddressSanitizer:DEADLYSIGNAL ================================================================= ==9104==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000004 (pc 0x0000004fbc0b bp 0x7ffd4665c270 sp 0x7ffd4665c140 T0) ==9104==The signal is caused by a READ memory access. ==9104==Hint: address points to the zero page. #00x4fbc0b (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fbc0b) #10x4f5932 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5932) #20x7fada3943c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #30x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fbc0b) ==9104==ABORTING
AddressSanitizer:DEADLYSIGNAL ================================================================= ==10580==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000004 (pc 0x0000004fe9a7 bp 0x7ffc7fadd310 sp 0x7ffc7fadd1a0 T0) ==10580==The signal is caused by a READ memory access. ==10580==Hint: address points to the zero page. ==10580==WARNING: failed to fork (errno 12) ==10580==WARNING: failed to fork (errno 12) ==10580==WARNING: failed to fork (errno 12) ==10580==WARNING: failed to fork (errno 12) ==10580==WARNING: failed to fork (errno 12) ==10580==WARNING: Failed to use and restart external symbolizer! #0 0x4fe9a7 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe9a7) #1 0x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #2 0x7f16ea646c86 (/lib/x86_64-linux-gnu/libc.so.6+0x21c86) #3 0x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe9a7) ==10580==ABORTING
AddressSanitizer:DEADLYSIGNAL ================================================================= ==128856==ERROR: AddressSanitizer: SEGV on unknown address 0x612000096e63 (pc 0x7fdeb5ff1384 bp 0x7ffd479c81d0 sp 0x7ffd479c7968 T0) ==128856==The signal is caused by a READ memory access. #00x7fdeb5ff1384 /build/glibc-CVJwZb/glibc-2.27/string/../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:431 #10x4ad6eb in __asan_memcpy (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4ad6eb) #20x6b53ed (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b53ed) #30x6b6b99 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b6b99) #40x5265aa (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5265aa) #50x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #60x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #70x7fdeb5f57c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #80x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /build/glibc-CVJwZb/glibc-2.27/string/../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:431 ==128856==ABORTING
AddressSanitizer:DEADLYSIGNAL ================================================================= ==130785==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000004 (pc 0x0000005266a8 bp 0x7ffd2f8bb3f0 sp 0x7ffd2f8baa80 T0) ==130785==The signal is caused by a READ memory access. ==130785==Hint: address points to the zero page. ==130785==WARNING: failed to fork (errno 12) ==130785==WARNING: failed to fork (errno 12) ==130785==WARNING: failed to fork (errno 12) ==130785==WARNING: failed to fork (errno 12) ==130785==WARNING: failed to fork (errno 12) ==130785==WARNING: Failed to use and restart external symbolizer! #00x5266a8 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5266a8) #10x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #20x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #30x7f952a4e0c86 (/lib/x86_64-linux-gnu/libc.so.6+0x21c86) #40x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5266a8) ==130785==ABORTING
AddressSanitizer:DEADLYSIGNAL ================================================================= ==1197==ERROR: AddressSanitizer: SEGV on unknown address 0x0000000004cc (pc 0x0000006badae bp 0x7ffecbb13010 sp 0x7ffecbb12ce0 T0) ==1197==The signal is caused by a READ memory access. ==1197==Hint: address points to the zero page. #00x6badae (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6badae) #10x527687 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x527687) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f62e925ec86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6badae) ==1197==ABORTING
AddressSanitizer:DEADLYSIGNAL ================================================================= ==2966==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000036 (pc 0x0000004fbbb6 bp 0x7ffddb299ed0 sp 0x7ffddb299da0 T0) ==2966==The signal is caused by a READ memory access. ==2966==Hint: address points to the zero page. #00x4fbbb6 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fbbb6) #10x4f5932 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5932) #20x7f3e141cac86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #30x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fbbb6) ==2966==ABORTING
AddressSanitizer:DEADLYSIGNAL ================================================================= ==3991==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000036 (pc 0x0000004fe954 bp 0x7ffec40bd110 sp 0x7ffec40bcfa0 T0) ==3991==The signal is caused by a READ memory access. ==3991==Hint: address points to the zero page. #00x4fe954 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe954) #10x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #20x7fee2bb48c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #30x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe954) ==3991==ABORTING
AddressSanitizer:DEADLYSIGNAL ================================================================= ==8370==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000704 (pc 0x0000006babea bp 0x7ffc00eb8610 sp 0x7ffc00eb82e0 T0) ==8370==The signal is caused by a READ memory access. ==8370==Hint: address points to the zero page. #00x6babea (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6babea) #10x527687 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x527687) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f8358612c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6babea) ==8370==ABORTING
AddressSanitizer:DEADLYSIGNAL ================================================================= ==9840==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000006b6a8f bp 0x0c2600000041 sp 0x7ffdf341f950 T0) ==9840==The signal is caused by a READ memory access. ==9840==Hint: address points to the zero page. #00x6b6a8f (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b6a8f) #10x5265aa (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x5265aa) #20x4fe3fe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe3fe) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f4071149c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x6b6a8f) ==9840==ABORTING
AddressSanitizer:DEADLYSIGNAL ================================================================= ==1585==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x000000703969 bp 0x7ffd74fa1170 sp 0x7ffd74f20f50 T0) ==1585==The signal is caused by a READ memory access. ==1585==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. #00x703969 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x703969) #10x65be5b (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x65be5b) #20x4fe2f1 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe2f1) #30x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #40x7f72f8d40c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #50x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x703969) ==1585==ABORTING
================================================================= ==1985==ERROR: AddressSanitizer: SEGV on unknown address 0x61b000010076 (pc 0x00000065f724 bp 0x7ffff2bcdf90 sp 0x7ffff2bcdde0 T0) ==1985==The signal is caused by a READ memory access. #00x65f724 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x65f724) #10x4fe89d (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4fe89d) #20x4f5710 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x4f5710) #30x7f4881d74c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #40x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x41c549)
AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/bupt/Desktop/otfcc/bin/release-x64/otfccdump+0x65f724) ==1985==ABORTING
==49487==ERROR: AddressSanitizer: heap-use-after-free on address 0x603000000011 at pc 0x00000044cfbf bp 0x7ffd38280160 sp 0x7ffd3827f910 READ of size 1 at 0x603000000011 thread T0 #0 0x44cfbe (/home/bupt/Desktop/otfcc/bin/release-x64/otfccbuild+0x44cfbe) #1 0x44e7dd in vsnprintf (/home/bupt/Desktop/otfcc/bin/release-x64/otfccbuild+0x44e7dd) #2 0x72a75e (/home/bupt/Desktop/otfcc/bin/release-x64/otfccbuild+0x72a75e) #3 0x72afc2 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccbuild+0x72afc2) #4 0x4f65ac (/home/bupt/Desktop/otfcc/bin/release-x64/otfccbuild+0x4f65ac) #5 0x7f6e50b86c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #6 0x41c549 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccbuild+0x41c549)
0x603000000011 is located 1 bytes inside of 20-byte region [0x603000000010,0x603000000024) freed by thread T0 here: #0 0x4ae7d2 in free (/home/bupt/Desktop/otfcc/bin/release-x64/otfccbuild+0x4ae7d2) #1 0x4f5cf4 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccbuild+0x4f5cf4) #2 0x7f6e50b86c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
previously allocated by thread T0 here: #0 0x4aeb10 in malloc (/home/bupt/Desktop/otfcc/bin/release-x64/otfccbuild+0x4aeb10) #1 0x724f05 (/home/bupt/Desktop/otfcc/bin/release-x64/otfccbuild+0x724f05)
SUMMARY: AddressSanitizer: heap-use-after-free (/home/bupt/Desktop/otfcc/bin/release-x64/otfccbuild+0x44cfbe) Shadow bytes around the buggy address: 0x0c067fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c067fff8000: fa fa[fd]fd fd fa fa fa fd fd fd fa fa fa fd fd 0x0c067fff8010: fd fa fa fa 00 00 00 00 fa fa fd fd fd fa fa fa 0x0c067fff8020: fd fd fd fa fa fa fd fd fd fa fa fa fd fd fd fa 0x0c067fff8030: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fa fa 0x0c067fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==49487==ABORTING