Compiling source from github on January 9, 2022, detected via Libfuzzer & UndefinedBehaviorSanitizer
Address Sanitizer output:
==759880==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x0000006d496b bp 0x7ff560bf5f70 sp 0x7ff560bf5ca0 T5)
==759880==The signal is caused by a READ memory access.
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior /src/bloaty/third_party/capstone/arch/X86/X86IntelInstPrinter.c:840:60 in
/src/bloaty/src/dwarf/debug_info.h:360:28: runtime error: member access within null pointer of type 'const AbbrevTable::Abbrev'
Compiling source from github on January 9, 2022, detected via Libfuzzer & UndefinedBehaviorSanitizer
Address Sanitizer output:
==759880==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x0000006d496b bp 0x7ff560bf5f70 sp 0x7ff560bf5ca0 T5) ==759880==The signal is caused by a READ memory access.
UBSan output:
./fuzz_target crash-a34.txt
crash-a34.txt
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3840240044 INFO: Loaded 1 modules (121532 inline 8-bit counters): 121532 [0x1143958, 0x1161414), INFO: Loaded 1 PC tables (121532 PCs): 121532 [0xd187d0,0xef3390), ./fuzz_target: Running 1 inputs 1 time(s) each. Running: crash-a34.txt
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior /src/bloaty/third_party/capstone/arch/X86/X86IntelInstPrinter.c:840:60 in /src/bloaty/src/dwarf/debug_info.h:360:28: runtime error: member access within null pointer of type 'const AbbrevTable::Abbrev'
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior /src/bloaty/src/dwarf/debug_info.h:360:28