[Bug 8661] New: Segmentation fault safe_write (fuzzing)
bugzilla at busybox.net
bugzilla at busybox.net
Tue Feb 9 16:01:57 UTC 2016
https://bugs.busybox.net/show_bug.cgi?id=8661
Bug ID: 8661
Summary: Segmentation fault safe_write (fuzzing)
Product: Busybox
Version: 1.24.x
Hardware: All
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: Other
Assignee: unassigned at busybox.net
Reporter: fernando at null-life.com
CC: busybox-cvs at busybox.net
Target Milestone: ---
Created attachment 6301
--> https://bugs.busybox.net/attachment.cgi?id=6301&action=edit
crashing test
Current config: https://paste.kde.org/pbsgwk4ob
https://paste.kde.org/pbsgwk4ob
(gdb) run sh fuzzed.sh
Starting program: /root/fuzzshell/busybox_unstripped sh fuzzed.sh
fuzzed.sh: trap: line 1: -1: invalid signal specification
fuzzed.sh: set: line 5: illegal option -o history
Segmentation fault
[Inferior 1 (process 14135) exited with code 0213]
(gdb) set follow-fork-mode
child parent
(gdb) set follow-fork-mode child
(gdb) run sh fuzzed.sh
Starting program: /root/fuzzshell/busybox_unstripped sh fuzzed.sh
fuzzed.sh: trap: line 1: -1: invalid signal specification
fuzzed.sh: set: line 5: illegal option -o history
[New process 14155]
Segmentation fault
Program received signal SIGPIPE, Broken pipe.
[Switching to process 14155]
0xb7fdcc38 in __kernel_vsyscall ()
(gdb) bt
#0 0xb7fdcc38 in __kernel_vsyscall ()
#1 0xb7e9ceb3 in __write_nocancel () at ../sysdeps/unix/syscall-template.S:81
#2 0x0804f2dc in safe_write ()
#3 0x00000000 in ?? ()
Valgrind:
==14419== Invalid read of size 4
==14419== at 0x808B556: listvars (in /root/fuzzshell/busybox_unstripped)
==14419== Address 0x2d206d76 is not stack'd, malloc'd or (recently) free'd
--
You are receiving this mail because:
You are on the CC list for the bug.
More information about the busybox-cvs
mailing list