[Bug 16153] New: Null Pointer Dereferenct at reformime
bugzilla at busybox.net
bugzilla at busybox.net
Sun Aug 11 07:59:05 UTC 2024
https://bugs.busybox.net/show_bug.cgi?id=16153
Bug ID: 16153
Summary: Null Pointer Dereferenct at reformime
Product: Busybox
Version: 1.36.x
Hardware: All
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: Standard Compliance
Assignee: unassigned at busybox.net
Reporter: stasos24 at gmail.com
CC: busybox-cvs at busybox.net
Target Milestone: ---
Created attachment 9790
--> https://bugs.busybox.net/attachment.cgi?id=9790&action=edit
Config.in with sanitizer flags
PoC:
- build busybox with sanitizer flags
- use provided commands below
./reformime .QQ -edeemOeJe
AddressSanitizer:DEADLYSIGNAL
=================================================================
==1371830==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc
0x5562063e0cda bp 0x000000000000 sp 0x7ffedc240f70 T0)
==1371830==The signal is caused by a READ memory access.
==1371830==Hint: address points to the zero page.
#0 0x5562063e0cda in llist_add_to_end libbb/llist.c:27
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV libbb/llist.c:27 in llist_add_to_end
==1371830==ABORTING
--
You are receiving this mail because:
You are on the CC list for the bug.
More information about the busybox-cvs
mailing list