=================================================================
==12020==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000780 at pc 0x7f1c928c81c6 bp 0x7fff11e2df00 sp 0x7fff11e2def8
READ of size 1 at 0x611000000780 thread T0
#0 0x7f1c928c81c5 in switch_b64_encode src/switch_utils.c:1028
#1 0x55a2280f4d28 in signtoken test/../gcs.c:81
#2 0x55a2280ef5e5 in main test/test_gcs.c:75
#3 0x7f1c91ed509a in __libc_start_main ../csu/libc-start.c:308
#4 0x55a2280f0c59 in _start (/drone/src/src/mod/applications/mod_http_cache/test/.libs/test_gcs+0xac59)
0x611000000780 is located 0 bytes to the right of 256-byte region [0x611000000680,0x611000000780)
allocated by thread T0 here:
#0 0x7f1c93348330 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.5+0xe9330)
#1 0x55a2280f4cbf in signtoken test/../gcs.c:78
#2 0x55a2280ef5e5 in main test/test_gcs.c:75
#3 0x7f1c91ed509a in __libc_start_main ../csu/libc-start.c:308
SUMMARY: AddressSanitizer: heap-buffer-overflow src/switch_utils.c:1028 in switch_b64_encode
Shadow bytes around the buggy address:
0x0c227fff80a0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c227fff80b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c227fff80c0: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa
0x0c227fff80d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c227fff80e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c227fff80f0:[fa]fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd
0x0c227fff8100: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c227fff8110: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa
0x0c227fff8120: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c227fff8130: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c227fff8140: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==12020==ABORTING