This bug was found while fuzzing graphicsmagick with afl-fuzz
Tested on hg changeset 44ed8318ba6a+
Command: gm convert id:000062,sig:06,src:000606,op:ext_AO,pos:17 /dev/null
=================================================================
==16891==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb5100cb4 at pc 0x08517ba9 bp 0xbfb95008 sp 0xbfb95000
READ of size 1 at 0xb5100cb4 thread T0
#0 0x8517ba8 in DecodeImage /home/user/Desktop/graphicsmagick/coders/sun.c:221:16
#1 0x8517ba8 in ReadSUNImage /home/user/Desktop/graphicsmagick/coders/sun.c:542
#2 0x81f84b4 in ReadImage /home/user/Desktop/graphicsmagick/magick/constitute.c:1607:14
#3 0x816fbca in ConvertImageCommand /home/user/Desktop/graphicsmagick/magick/command.c:4348:22
#4 0x8187f6b in MagickCommand /home/user/Desktop/graphicsmagick/magick/command.c:8862:27
#5 0x81cd999 in GMCommandSingle /home/user/Desktop/graphicsmagick/magick/command.c:17338:10
#6 0x81cc6ae in GMCommand /home/user/Desktop/graphicsmagick/magick/command.c:17391:16
#7 0x8139511 in main /home/user/Desktop/graphicsmagick/utilities/gm.c:61:10
#8 0xb74ad73d in __libc_start_main /build/glibc-tVsQx_/glibc-2.21/csu/libc-start.c:289
#9 0x807fd9b in _start (/home/user/Desktop/graphicsmagick/utilities/gm+0x807fd9b)
0xb5100cb4 is located 0 bytes to the right of 36-byte region [0xb5100c90,0xb5100cb4)
allocated by thread T0 here:
#0 0x8117a29 in malloc (/home/user/Desktop/graphicsmagick/utilities/gm+0x8117a29)
#1 0x827e984 in MagickMalloc /home/user/Desktop/graphicsmagick/magick/memory.c:156:11
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/user/Desktop/graphicsmagick/coders/sun.c:221 DecodeImage
Shadow bytes around the buggy address:
0x36a20140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x36a20150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x36a20160: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x36a20170: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x36a20180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x36a20190: fa fa 00 00 00 00[04]fa fa fa 00 00 00 00 00 05
0x36a201a0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd
0x36a201b0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd
0x36a201c0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
0x36a201d0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
0x36a201e0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==16891==ABORTING
Diff:
This bug was also fixed by Mercurial changeset 14744:545b607e46c6