[Bug 8666] New: Segmentation fault trapcmd (fuzzing)

bugzilla at busybox.net bugzilla at busybox.net
Tue Feb 9 16:05:30 UTC 2016


            Bug ID: 8666
           Summary: Segmentation fault trapcmd (fuzzing)
           Product: Busybox
           Version: 1.24.x
          Hardware: All
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P5
         Component: Other
          Assignee: unassigned at busybox.net
          Reporter: fernando at null-life.com
                CC: busybox-cvs at busybox.net
  Target Milestone: ---

Created attachment 6306
  --> https://bugs.busybox.net/attachment.cgi?id=6306&action=edit
crashing test

Current config:

(gdb) run sh fuzzed.sh 
Starting program: /root/fuzzshell/busybox_unstripped sh fuzzed.sh
fuzzed.sh: trap: line 1: USR340282366920938463463374607431768211456: invalid
signal specification

Program received signal SIGSEGV, Segmentation fault.
0x0808bac5 in trapcmd ()
(gdb) bt
#0  0x0808bac5 in trapcmd ()
#1  0x00000000 in ?? ()

Valgrind reports

==15131== Invalid read of size 4
==15131==    at 0x808BAC5: trapcmd (in /root/fuzzshell/busybox_unstripped)
==15131==  Address 0x6ba9240c is not stack'd, malloc'd or (recently) free'd

You are receiving this mail because:
You are on the CC list for the bug.

More information about the busybox-cvs mailing list