[Bug 249166] ports-mgmt/pkg audit -F Segmentation fault

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Mon Sep 7 15:10:41 UTC 2020


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249166

--- Comment #2 from Matthias Andree <mandree at FreeBSD.org> ---
Thread 1 (LWP 100699 of process 42411):
#0  0x000000000050413f in pkg_fetch_file_to_fd (repo=0x0, url=0x800fe7090
"http://vuxml.freebsd.org/freebsd/vuln.xml.bz2", dest=5, t=0x7fffffffcc38,
offset=0, size=-1, silent=false) at fetch.c:226
        u = 0x0
        kv = 0x0
        kvtmp = 0x0
        envtorestore = 0x0
        envtounset = 0x0
        tmp = 0x0
        done = 0
        r = 0
        buf = '\000' <repeats 2024 times>...
        retcode = 0
        sz = 0
        buflen = 0
        left = 0
        fetcher = 0x0
        remote = 0x0
#1  0x0000000000503f35 in pkg_fetch_file_tmp (repo=0x0, url=0x800fe7090
"http://vuxml.freebsd.org/freebsd/vuln.xml.bz2", dest=0x7fffffffcde0
"/tmp/vuln.xml.bz2.I1CiSa8L", t=1599442709) at fetch.c:112
        fd = 5
        retcode = 3
#2  0x000000000047f2b9 in pkg_audit_fetch (src=0x800fe7090
"http://vuxml.freebsd.org/freebsd/vuln.xml.bz2", dest=0x0) at pkg_audit.c:276
        fd = -1
        outfd = -1
        tmp =
"/tmp/vuln.xml.bz2.I1CiSa8L\000\000\000\000\000\000q\000\000\000q\203&5\000\206V\000\b\000\000\000\000\206V\000\b\000\000\000\a\000\000\000\000\000\000\000\203H#\000\000\000\000\000\200\200V\000\b\000\000\000\000\206V\000\b\000\000\000e[S\000\b\000\000\000\203H#\000\000\000\000\000\200\317\377\377\377\177\000\000࠶\000\b\000\000\000\a\000\000\000\b\000\000\000G\t\000\000\000\000\000\000TU\267\000\b\000\000\000\330\316\377\377\377\177\000\000\326\f\a\003^\254\203\245\300\316\377\377\377\177\000\000\344\066@\000\000\000\000\000\300\021\376\000\b\000\000\000\000\000\000\000\001\000\000\000\300\021\376\000\b\000\000\000\203H"...
        tmpdir = 0x240280 "/tmp"
        retcode = 3
        t = 1599442709
        st = {st_dev = 13574555021139550870, st_ino = 11, st_nlink = 1, st_mode
= 33060, st_padding0 = 0, st_uid = 0, st_gid = 0, st_padding1 = 0, st_rdev =
18446744073709551615, st_atim = {tv_sec = 1599442709, tv_nsec = 659811000},
st_mtim = {tv_sec = 1599442709, tv_nsec = 306768000}, st_ctim = {tv_sec =
1599442709, tv_nsec = 306768000}, st_birthtim = {tv_sec = 1516670331, tv_nsec =
88524000}, st_size = 6339069, st_blocks = 7144, st_blksize = 131072, st_flags =
2048, st_gen = 8013493, st_spare = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0}}
        cbdata = {out = 1599491381, fname = 0x14 <error: Cannot access memory
at address 0x14>, dest = 0x225a58 "CASE_SENSITIVE_MATCH"}
        dfd = 4
#3  0x00000000002ada78 in exec_audit (argc=0, argv=0x7fffffffdac8) at
audit.c:164
        audit = 0x800fe72a0
        db = 0x0
        it = 0x0
        pkg = 0x0
        name = 0x7fffffffd310 "\346\333#"
        version = 0x800fe7030 "`p\376"
        audit_file = 0x0
        affected = 0
        vuln = 0
        fetch = true
        recursive = false
        ch = -1
        i = -11648
        ret = 0
        sb = 0x225a58
        check = 0x0
        longopts = {{name = 0x22e1b6 "fetch", has_arg = 0, flag = 0x0, val =
70}, {name = 0x247986 "file", has_arg = 1, flag = 0x0, val = 102}, {name =
0x23dbe6 "recursive", has_arg = 0, flag = 0x0, val = 114}, {name = 0x23521a
"quiet", has_arg = 0, flag = 0x0, val = 113}, {name = 0x0, has_arg = 0, flag =
0x0, val = 0}}
#4  0x00000000002bc1ed in main (argc=2, argv=0x7fffffffdab8) at main.c:886
        i = 3
        command = 0x5220c0 <cmd+96>
        ambiguous = 0
        chroot_path = 0x0
        rootdir = 0x0
        jid = 0
        jail_str = 0x0
        len = 5
        ch = -1 '\377'
        debug = 0
        version = 0
        ret = 0
        plugins_enabled = true
        plugin_found = false
        show_commands = false
        activation_test = false
        init_flags = (unknown: 0)
        c = 0x0
        conffile = 0x0
        reposdir = 0x0
        save_argv = 0x7fffffffdab8
        realrootdir = "\000\000\000\000\000\000\000\000p\330\377\377\377\177",
'\000' <repeats 11 times>,
"\232T\000\b\000\000\000\000\327\377\377\377\177\000\000\067SS\000\b", '\000'
<repeats 19 times>,
"\271+!\000\000\000\000\000\004ϊ\006\000\000\000\000\364\362\217\362\000\000\000\000\060\002U\000\b\000\000\000\001\000\000\000\000\000\000\000\000HU\000\b\000\000\000\300{\266\000\b\000\000\000
\331\377\377\377\177\000\000\271+!\000\000\000\000\000\004ϊ\006\000\000\000\000\060\002U\000\b\000\000\000
\331\377\377\377\177\000\000\364\362\217\362\001\000\000\000\020\327\377\377\377\177\000\000\002\000\000\000\000\000\000\000\000\260T\000\b\000\000\000\000\260T\000\b\000\000\000p\330"...
        j = 0
        longopts = {{name = 0x22e2ac "debug", has_arg = 0, flag = 0x0, val =
100}, {name = 0x2202b5 "jail", has_arg = 1, flag = 0x0, val = 106}, {name =
0x2325e4 "chroot", has_arg = 1, flag = 0x0, val = 99}, {name = 0x221e5f
"config", has_arg = 1, flag = 0x0, val = 67}, {name = 0x228873 "repo-conf-dir",
has_arg = 1, flag = 0x0, val = 82}, {name = 0x24437d "rootdir", has_arg = 1,
flag = 0x0, val = 114}, {name = 0x2201b7 "list", has_arg = 0, flag = 0x0, val =
108}, {name = 0x22cd3d "version", has_arg = 0, flag = 0x0, val = 118}, {name =
0x2460b5 "option", has_arg = 1, flag = 0x0, val = 111}, {name = 0x240375
"only-ipv4", has_arg = 0, flag = 0x0, val = 52}, {name = 0x221e66 "only-ipv6",
has_arg = 0, flag = 0x0, val = 54}, {name = 0x0, has_arg = 0, flag = 0x0, val =
0}}

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-pkg mailing list