[Bug 16153] New: Null Pointer Dereferenct at reformime

bugzilla at busybox.net bugzilla at busybox.net
Sun Aug 11 07:59:05 UTC 2024


https://bugs.busybox.net/show_bug.cgi?id=16153

            Bug ID: 16153
           Summary: Null Pointer Dereferenct at reformime
           Product: Busybox
           Version: 1.36.x
          Hardware: All
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P5
         Component: Standard Compliance
          Assignee: unassigned at busybox.net
          Reporter: stasos24 at gmail.com
                CC: busybox-cvs at busybox.net
  Target Milestone: ---

Created attachment 9790
  --> https://bugs.busybox.net/attachment.cgi?id=9790&action=edit
Config.in with sanitizer flags

PoC: 
- build busybox with sanitizer flags
- use provided commands below

./reformime .QQ -edeemOeJe
AddressSanitizer:DEADLYSIGNAL
=================================================================
==1371830==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc
0x5562063e0cda bp 0x000000000000 sp 0x7ffedc240f70 T0)
==1371830==The signal is caused by a READ memory access.
==1371830==Hint: address points to the zero page.
    #0 0x5562063e0cda in llist_add_to_end libbb/llist.c:27

AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV libbb/llist.c:27 in llist_add_to_end
==1371830==ABORTING

-- 
You are receiving this mail because:
You are on the CC list for the bug.


More information about the busybox-cvs mailing list