[Bug 8666] New: Segmentation fault trapcmd (fuzzing)
bugzilla at busybox.net
bugzilla at busybox.net
Tue Feb 9 16:05:30 UTC 2016
https://bugs.busybox.net/show_bug.cgi?id=8666
Bug ID: 8666
Summary: Segmentation fault trapcmd (fuzzing)
Product: Busybox
Version: 1.24.x
Hardware: All
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: Other
Assignee: unassigned at busybox.net
Reporter: fernando at null-life.com
CC: busybox-cvs at busybox.net
Target Milestone: ---
Created attachment 6306
--> https://bugs.busybox.net/attachment.cgi?id=6306&action=edit
crashing test
Current config:
https://paste.kde.org/pbsgwk4ob
(gdb) run sh fuzzed.sh
Starting program: /root/fuzzshell/busybox_unstripped sh fuzzed.sh
fuzzed.sh: trap: line 1: USR340282366920938463463374607431768211456: invalid
signal specification
Program received signal SIGSEGV, Segmentation fault.
0x0808bac5 in trapcmd ()
(gdb) bt
#0 0x0808bac5 in trapcmd ()
#1 0x00000000 in ?? ()
Valgrind reports
==15131== Invalid read of size 4
==15131== at 0x808BAC5: trapcmd (in /root/fuzzshell/busybox_unstripped)
==15131== Address 0x6ba9240c is not stack'd, malloc'd or (recently) free'd
--
You are receiving this mail because:
You are on the CC list for the bug.
More information about the busybox-cvs
mailing list