[Bug 8661] New: Segmentation fault safe_write (fuzzing)

bugzilla at busybox.net bugzilla at busybox.net
Tue Feb 9 16:01:57 UTC 2016


https://bugs.busybox.net/show_bug.cgi?id=8661

            Bug ID: 8661
           Summary: Segmentation fault safe_write  (fuzzing)
           Product: Busybox
           Version: 1.24.x
          Hardware: All
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P5
         Component: Other
          Assignee: unassigned at busybox.net
          Reporter: fernando at null-life.com
                CC: busybox-cvs at busybox.net
  Target Milestone: ---

Created attachment 6301
  --> https://bugs.busybox.net/attachment.cgi?id=6301&action=edit
crashing test

Current config:  https://paste.kde.org/pbsgwk4ob

https://paste.kde.org/pbsgwk4ob


(gdb) run sh fuzzed.sh 
Starting program: /root/fuzzshell/busybox_unstripped sh fuzzed.sh
fuzzed.sh: trap: line 1: -1: invalid signal specification
fuzzed.sh: set: line 5: illegal option -o history
Segmentation fault
[Inferior 1 (process 14135) exited with code 0213]
(gdb) set follow-fork-mode 
child   parent  
(gdb) set follow-fork-mode child
(gdb) run sh fuzzed.sh 
Starting program: /root/fuzzshell/busybox_unstripped sh fuzzed.sh
fuzzed.sh: trap: line 1: -1: invalid signal specification
fuzzed.sh: set: line 5: illegal option -o history
[New process 14155]
Segmentation fault

Program received signal SIGPIPE, Broken pipe.
[Switching to process 14155]
0xb7fdcc38 in __kernel_vsyscall ()
(gdb) bt
#0  0xb7fdcc38 in __kernel_vsyscall ()
#1  0xb7e9ceb3 in __write_nocancel () at ../sysdeps/unix/syscall-template.S:81
#2  0x0804f2dc in safe_write ()
#3  0x00000000 in ?? ()

Valgrind:
==14419== Invalid read of size 4
==14419==    at 0x808B556: listvars (in /root/fuzzshell/busybox_unstripped)
==14419==  Address 0x2d206d76 is not stack'd, malloc'd or (recently) free'd

-- 
You are receiving this mail because:
You are on the CC list for the bug.


More information about the busybox-cvs mailing list