=================================================================
==35579==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000009db2 at pc 0x00000121045c bp 0x7ffd92634240 sp 0x7ffd92634238
READ of size 1 at 0x604000009db2 thread T0
#0 0x121045b in get_unaligned_be32 /src/cairo/_builddir/../src/cairoint.h:257:48
#1 0x120ffe8 in _jpx_next_box /src/cairo/_builddir/../src/cairo-image-info.c:167:16
#2 0x1210056 in _jpx_find_box /src/cairo/_builddir/../src/cairo-image-info.c:196:6
#3 0x120fe9a in _cairo_image_info_get_jpx_info /src/cairo/_builddir/../src/cairo-image-info.c:233:9
#4 0x11b342a in _cairo_pdf_surface_emit_jpx_image /src/cairo/_builddir/../src/cairo-pdf-surface.c:3329:14
#5 0x11a3dc2 in _cairo_pdf_surface_emit_surface /src/cairo/_builddir/../src/cairo-pdf-surface.c:3753:11
#6 0x11a9665 in _cairo_pdf_surface_add_source_surface /src/cairo/_builddir/../src/cairo-pdf-surface.c:1735:14
#7 0x11a7551 in _cairo_pdf_surface_paint_surface_pattern /src/cairo/_builddir/../src/cairo-pdf-surface.c:5023:11
#8 0x11a6c18 in _cairo_pdf_surface_paint_pattern /src/cairo/_builddir/../src/cairo-pdf-surface.c:5166:9
#9 0x119cfcc in _cairo_pdf_surface_paint /src/cairo/_builddir/../src/cairo-pdf-surface.c:7988:11
#10 0x116876c in _cairo_surface_paint /src/cairo/_builddir/../src/cairo-surface.c:2199:14
#11 0x1162ad7 in _cairo_surface_wrapper_paint /src/cairo/_builddir/../src/cairo-surface-wrapper.c:162:14
#12 0x1142fde in _cairo_recording_surface_replay_internal /src/cairo/_builddir/../src/cairo-recording-surface.c:1862:15
#13 0x1144cf0 in _cairo_recording_surface_replay_region /src/cairo/_builddir/../src/cairo-recording-surface.c:2235:12
#14 0x123021c in _paint_page /src/cairo/_builddir/../src/cairo-paginated-surface.c:469:11
#15 0x122f1be in _cairo_paginated_surface_show_page /src/cairo/_builddir/../src/cairo-paginated-surface.c:583:14
#16 0x116e2df in cairo_surface_show_page /src/cairo/_builddir/../src/cairo-surface.c:2506:40
#17 0x5ec4f0 in LLVMFuzzerTestOneInput /src/poppler/glib/tests/fuzzing/pdf_draw_fuzzer.cc:66:9
#18 0x4f22d3 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15
#19 0x4dda42 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:323:6
#20 0x4e36e6 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:856:9
#21 0x50cbf2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
#22 0x7f1cf2b3eb26 in __libc_start_main (/lib64/libc.so.6+0x25b26)
#23 0x4b98f9 in _start (/out/pdf_draw_fuzzer+0x4b98f9)
0x604000009db2 is located 0 bytes to the right of 34-byte region [0x604000009d90,0x604000009db2)
allocated by thread T0 here:
#0 0x5b8ffd in malloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:145:3
#1 0x6415cb in gmalloc(unsigned long, bool) /src/poppler/goo/gmem.h:44:19
#2 0x64c03a in CairoOutputDev::getStreamData(Stream*, char**, int*) /src/poppler/poppler/CairoOutputDev.cc:2978:25
#3 0x64bda2 in CairoOutputDev::setMimeData(GfxState*, Stream*, Object*, GfxImageColorMap*, _cairo_surface*, int) /src/poppler/poppler/CairoOutputDev.cc:3180:13
#4 0x64cef1 in CairoOutputDev::drawImage(GfxState*, Object*, Stream*, int, int, GfxImageColorMap*, bool, int const*, bool) /src/poppler/poppler/CairoOutputDev.cc:3400:13
#5 0x7aa235 in Gfx::doImage(Object*, Stream*, bool) /src/poppler/poppler/Gfx.cc:4589:22
#6 0x77f5f3 in Gfx::opXObject(Object*, int) /src/poppler/poppler/Gfx.cc:4118:13
#7 0x79067d in Gfx::execOp(Object*, Object*, int) /src/poppler/poppler/Gfx.cc:809:5
#8 0x78f93c in Gfx::go(bool) /src/poppler/poppler/Gfx.cc:684:13
#9 0x78f304 in Gfx::display(Object*, bool) /src/poppler/poppler/Gfx.cc:645:5
#10 0x87607b in Page::displaySlice(OutputDev*, double, double, int, bool, bool, int, int, int, int, bool, bool (*)(void*), void*, bool (*)(Annot*, void*), void*, bool) /src/poppler/poppler/Page.cc:584:14
#11 0x60c88e in _poppler_page_render(_PopplerPage*, _cairo*, bool, PopplerPrintFlags) /src/poppler/glib/poppler-page.cc:331:17
#12 0x60cb0b in poppler_page_render_for_printing /src/poppler/glib/poppler-page.cc:420:5
#13 0x5ec4e7 in LLVMFuzzerTestOneInput /src/poppler/glib/tests/fuzzing/pdf_draw_fuzzer.cc:65:9
#14 0x4f22d3 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15
#15 0x4dda42 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:323:6
#16 0x4e36e6 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:856:9
#17 0x50cbf2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
#18 0x7f1cf2b3eb26 in __libc_start_main (/lib64/libc.so.6+0x25b26)
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/cairo/_builddir/../src/cairoint.h:257:48 in get_unaligned_be32
Shadow bytes around the buggy address:
0x0c087fff9360: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd
0x0c087fff9370: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd
0x0c087fff9380: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd
0x0c087fff9390: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd
0x0c087fff93a0: fa fa 00 00 00 00 00 fa fa fa fd fd fd fd fd fd
=>0x0c087fff93b0: fa fa 00 00 00 00[02]fa fa fa 00 00 00 00 02 fa
0x0c087fff93c0: fa fa 00 00 00 00 00 fa fa fa fd fd fd fd fd fd
0x0c087fff93d0: fa fa 00 00 00 00 00 00 fa fa fa fa fa fa fa fa
0x0c087fff93e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff93f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff9400: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==35579==ABORTING