Date: Mon, 07 Sep 2020 15:10:41 +0000 From: bugzilla-noreply@freebsd.org To: pkg@FreeBSD.org Subject: [Bug 249166] ports-mgmt/pkg audit -F Segmentation fault Message-ID: <bug-249166-32340-A6DTwquRaI@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-249166-32340@https.bugs.freebsd.org/bugzilla/> References: <bug-249166-32340@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D249166 --- Comment #2 from Matthias Andree <mandree@FreeBSD.org> --- Thread 1 (LWP 100699 of process 42411): #0 0x000000000050413f in pkg_fetch_file_to_fd (repo=3D0x0, url=3D0x800fe70= 90 "http://vuxml.freebsd.org/freebsd/vuln.xml.bz2", dest=3D5, t=3D0x7fffffffcc= 38, offset=3D0, size=3D-1, silent=3Dfalse) at fetch.c:226 u =3D 0x0 kv =3D 0x0 kvtmp =3D 0x0 envtorestore =3D 0x0 envtounset =3D 0x0 tmp =3D 0x0 done =3D 0 r =3D 0 buf =3D '\000' <repeats 2024 times>... retcode =3D 0 sz =3D 0 buflen =3D 0 left =3D 0 fetcher =3D 0x0 remote =3D 0x0 #1 0x0000000000503f35 in pkg_fetch_file_tmp (repo=3D0x0, url=3D0x800fe7090 "http://vuxml.freebsd.org/freebsd/vuln.xml.bz2", dest=3D0x7fffffffcde0 "/tmp/vuln.xml.bz2.I1CiSa8L", t=3D1599442709) at fetch.c:112 fd =3D 5 retcode =3D 3 #2 0x000000000047f2b9 in pkg_audit_fetch (src=3D0x800fe7090 "http://vuxml.freebsd.org/freebsd/vuln.xml.bz2", dest=3D0x0) at pkg_audit.c= :276 fd =3D -1 outfd =3D -1 tmp =3D "/tmp/vuln.xml.bz2.I1CiSa8L\000\000\000\000\000\000q\000\000\000q\203&5\000= \206V\000\b\000\000\000\000\206V\000\b\000\000\000\a\000\000\000\000\000\00= 0\000\203H#\000\000\000\000\000\200\200V\000\b\000\000\000\000\206V\000\b\0= 00\000\000e[S\000\b\000\000\000\203H#\000\000\000\000\000\200\317\377\377\3= 77\177\000\000=E0=A0=B6\000\b\000\000\000\a\000\000\000\b\000\000\000G\t\00= 0\000\000\000\000\000TU\267\000\b\000\000\000\330\316\377\377\377\177\000\0= 00\326\f\a\003^\254\203\245\300\316\377\377\377\177\000\000\344\066@\000\00= 0\000\000\000\300\021\376\000\b\000\000\000\000\000\000\000\001\000\000\000= \300\021\376\000\b\000\000\000\203H"... tmpdir =3D 0x240280 "/tmp" retcode =3D 3 t =3D 1599442709 st =3D {st_dev =3D 13574555021139550870, st_ino =3D 11, st_nlink = =3D 1, st_mode =3D 33060, st_padding0 =3D 0, st_uid =3D 0, st_gid =3D 0, st_padding1 =3D 0= , st_rdev =3D 18446744073709551615, st_atim =3D {tv_sec =3D 1599442709, tv_nsec =3D 65981= 1000}, st_mtim =3D {tv_sec =3D 1599442709, tv_nsec =3D 306768000}, st_ctim =3D {tv= _sec =3D 1599442709, tv_nsec =3D 306768000}, st_birthtim =3D {tv_sec =3D 1516670331,= tv_nsec =3D 88524000}, st_size =3D 6339069, st_blocks =3D 7144, st_blksize =3D 131072, = st_flags =3D 2048, st_gen =3D 8013493, st_spare =3D {0, 0, 0, 0, 0, 0, 0, 0, 0, 0}} cbdata =3D {out =3D 1599491381, fname =3D 0x14 <error: Cannot acces= s memory at address 0x14>, dest =3D 0x225a58 "CASE_SENSITIVE_MATCH"} dfd =3D 4 #3 0x00000000002ada78 in exec_audit (argc=3D0, argv=3D0x7fffffffdac8) at audit.c:164 audit =3D 0x800fe72a0 db =3D 0x0 it =3D 0x0 pkg =3D 0x0 name =3D 0x7fffffffd310 "\346\333#" version =3D 0x800fe7030 "`p\376" audit_file =3D 0x0 affected =3D 0 vuln =3D 0 fetch =3D true recursive =3D false ch =3D -1 i =3D -11648 ret =3D 0 sb =3D 0x225a58 check =3D 0x0 longopts =3D {{name =3D 0x22e1b6 "fetch", has_arg =3D 0, flag =3D 0= x0, val =3D 70}, {name =3D 0x247986 "file", has_arg =3D 1, flag =3D 0x0, val =3D 102}, = {name =3D 0x23dbe6 "recursive", has_arg =3D 0, flag =3D 0x0, val =3D 114}, {name =3D = 0x23521a "quiet", has_arg =3D 0, flag =3D 0x0, val =3D 113}, {name =3D 0x0, has_arg = =3D 0, flag =3D 0x0, val =3D 0}} #4 0x00000000002bc1ed in main (argc=3D2, argv=3D0x7fffffffdab8) at main.c:= 886 i =3D 3 command =3D 0x5220c0 <cmd+96> ambiguous =3D 0 chroot_path =3D 0x0 rootdir =3D 0x0 jid =3D 0 jail_str =3D 0x0 len =3D 5 ch =3D -1 '\377' debug =3D 0 version =3D 0 ret =3D 0 plugins_enabled =3D true plugin_found =3D false show_commands =3D false activation_test =3D false init_flags =3D (unknown: 0) c =3D 0x0 conffile =3D 0x0 reposdir =3D 0x0 save_argv =3D 0x7fffffffdab8 realrootdir =3D "\000\000\000\000\000\000\000\000p\330\377\377\377\= 177", '\000' <repeats 11 times>, "\232T\000\b\000\000\000\000\327\377\377\377\177\000\000\067SS\000\b", '\00= 0' <repeats 19 times>, "\271+!\000\000\000\000\000\004=CF=8A\006\000\000\000\000\364\362\217\362\0= 00\000\000\000\060\002U\000\b\000\000\000\001\000\000\000\000\000\000\000\0= 00HU\000\b\000\000\000\300{\266\000\b\000\000\000 \331\377\377\377\177\000\000\271+!\000\000\000\000\000\004=CF=8A\006\000\00= 0\000\000\060\002U\000\b\000\000\000 \331\377\377\377\177\000\000\364\362\217\362\001\000\000\000\020\327\377\37= 7\377\177\000\000\002\000\000\000\000\000\000\000\000\260T\000\b\000\000\00= 0\000\260T\000\b\000\000\000p\330"... j =3D 0 longopts =3D {{name =3D 0x22e2ac "debug", has_arg =3D 0, flag =3D 0= x0, val =3D 100}, {name =3D 0x2202b5 "jail", has_arg =3D 1, flag =3D 0x0, val =3D 106},= {name =3D 0x2325e4 "chroot", has_arg =3D 1, flag =3D 0x0, val =3D 99}, {name =3D 0x22= 1e5f "config", has_arg =3D 1, flag =3D 0x0, val =3D 67}, {name =3D 0x228873 "rep= o-conf-dir", has_arg =3D 1, flag =3D 0x0, val =3D 82}, {name =3D 0x24437d "rootdir", has= _arg =3D 1, flag =3D 0x0, val =3D 114}, {name =3D 0x2201b7 "list", has_arg =3D 0, flag = =3D 0x0, val =3D 108}, {name =3D 0x22cd3d "version", has_arg =3D 0, flag =3D 0x0, val =3D 11= 8}, {name =3D 0x2460b5 "option", has_arg =3D 1, flag =3D 0x0, val =3D 111}, {name =3D 0x2= 40375 "only-ipv4", has_arg =3D 0, flag =3D 0x0, val =3D 52}, {name =3D 0x221e66 "= only-ipv6", has_arg =3D 0, flag =3D 0x0, val =3D 54}, {name =3D 0x0, has_arg =3D 0, fla= g =3D 0x0, val =3D 0}} --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-249166-32340-A6DTwquRaI>