15,888,088 members
Sign in
Sign in
Email
Password
Forgot your password?
Sign in with
home
articles
Browse Topics
>
Latest Articles
Top Articles
Posting/Update Guidelines
Article Help Forum
Submit an article or tip
Import GitHub Project
Import your Blog
quick answers
Q&A
Ask a Question
View Unanswered Questions
View All Questions
View C# questions
View C++ questions
View Javascript questions
View Visual Basic questions
View Python questions
discussions
forums
CodeProject.AI Server
All Message Boards...
Application Lifecycle
>
Running a Business
Sales / Marketing
Collaboration / Beta Testing
Work Issues
Design and Architecture
Artificial Intelligence
ASP.NET
JavaScript
Internet of Things
C / C++ / MFC
>
ATL / WTL / STL
Managed C++/CLI
C#
Free Tools
Objective-C and Swift
Database
Hardware & Devices
>
System Admin
Hosting and Servers
Java
Linux Programming
Python
.NET (Core and Framework)
Android
iOS
Mobile
WPF
Visual Basic
Web Development
Site Bugs / Suggestions
Spam and Abuse Watch
features
features
Competitions
News
The Insider Newsletter
The Daily Build Newsletter
Newsletter archive
Surveys
CodeProject Stuff
community
lounge
Who's Who
Most Valuable Professionals
The Lounge
The CodeProject Blog
Where I Am: Member Photos
The Insider News
The Weird & The Wonderful
help
?
What is 'CodeProject'?
General FAQ
Ask a Question
Bugs and Suggestions
Article Help Forum
About Us
Search within:
Articles
Quick Answers
Messages
Comments by Irodabonu Komilova (Top 5 by date)
Irodabonu Komilova
28-Mar-23 9:51am
View
=================================================================
==14118==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000059 at pc 0x55c8d9e2a76e bp 0x7ffe164bf5d0 sp 0x7ffe164bf5c0
READ of size 1 at 0x603000000059 thread T0
#0 0x55c8d9e2a76d in my_bsq /home/docode/project/my_bsq.c:182
#1 0x55c8d9e2ae04 in main /home/docode/project/my_bsq.c:238
#2 0x7f7415e5e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082)
#3 0x55c8d9e2930d in _start (/home/docode/project/my_bsq+0x130d)
0x603000000059 is located 0 bytes to the right of 25-byte region [0x603000000040,0x603000000059)
allocated by thread T0 here:
#0 0x7f7416139808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144
#1 0x55c8d9e298c2 in str_make_index /home/docode/project/my_bsq.c:64
#2 0x55c8d9e2a3cc in my_bsq /home/docode/project/my_bsq.c:174
#3 0x55c8d9e2ae04 in main /home/docode/project/my_bsq.c:238
#4 0x7f7415e5e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082)
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/docode/project/my_bsq.c:182 in my_bsq
Shadow bytes around the buggy address:
0x0c067fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c067fff8000: fa fa fd fd fd fd fa fa 00 00 00[01]fa fa fa fa
0x0c067fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==14118==ABORTING////
it is showing this
Irodabonu Komilova
28-Mar-23 9:51am
View
=================================================================
==14118==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000059 at pc 0x55c8d9e2a76e bp 0x7ffe164bf5d0 sp 0x7ffe164bf5c0
READ of size 1 at 0x603000000059 thread T0
#0 0x55c8d9e2a76d in my_bsq /home/docode/project/my_bsq.c:182
#1 0x55c8d9e2ae04 in main /home/docode/project/my_bsq.c:238
#2 0x7f7415e5e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082)
#3 0x55c8d9e2930d in _start (/home/docode/project/my_bsq+0x130d)
0x603000000059 is located 0 bytes to the right of 25-byte region [0x603000000040,0x603000000059)
allocated by thread T0 here:
#0 0x7f7416139808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144
#1 0x55c8d9e298c2 in str_make_index /home/docode/project/my_bsq.c:64
#2 0x55c8d9e2a3cc in my_bsq /home/docode/project/my_bsq.c:174
#3 0x55c8d9e2ae04 in main /home/docode/project/my_bsq.c:238
#4 0x7f7415e5e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082)
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/docode/project/my_bsq.c:182 in my_bsq
Shadow bytes around the buggy address:
0x0c067fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c067fff8000: fa fa fd fd fd fd fa fa 00 00 00[01]fa fa fa fa
0x0c067fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==14118==ABORTING
///it is showing this
Irodabonu Komilova
5-Mar-23 8:08am
View
thank you very much
Irodabonu Komilova
5-Jan-23 0:41am
View
Thank you teacher
Irodabonu Komilova
3-Jan-23 6:43am
View
thank you