Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AddressSanitizer: SEGV on unknown address 0x603f8002afdf #6920

Closed
mtowalski opened this issue Mar 5, 2017 · 1 comment
Closed

AddressSanitizer: SEGV on unknown address 0x603f8002afdf #6920

mtowalski opened this issue Mar 5, 2017 · 1 comment
Labels
Milestone

Comments

@mtowalski
Copy link

mtowalski commented Mar 5, 2017

Repro file available here :
https://github.com/mtowalski/radare2_quick_fuzz/tree/master/SEGV-69d-de1-274-poc

OS: Ubuntu 16.04.1 LTS x64
r2_version : master

CMD : radare2 -Acq i [FILE]

ASAN log:

==68948==ERROR: AddressSanitizer: SEGV on unknown address 0x603f8002afdf (pc 0x7f7819278487 bp 0x7ffd3d8913e0 sp 0x7ffd3d891300 T0)
    #0 0x7f7819278486 in d_unqualified_name /home/test/tmp/radare2/libr/bin/mangling/cxx/cp-demangle.c:1520
    #1 0x7f7819278868 in d_prefix /home/test/tmp/radare2/libr/bin/mangling/cxx/cp-demangle.c:1423
    #2 0x7f7819277774 in d_nested_name /home/test/tmp/radare2/libr/bin/mangling/cxx/cp-demangle.c:1360
    #3 0x7f7819276308 in d_name /home/test/tmp/radare2/libr/bin/mangling/cxx/cp-demangle.c:1270
    #4 0x7f781926182d in d_encoding /home/test/tmp/radare2/libr/bin/mangling/cxx/cp-demangle.c:1189
    #5 0x7f78192612dd in cplus_demangle_mangled_name /home/test/tmp/radare2/libr/bin/mangling/cxx/cp-demangle.c:1104
    #6 0x7f781927432d in d_demangle_callback /home/test/tmp/radare2/libr/bin/mangling/cxx/cp-demangle.c:5524
    #7 0x7f78192738a4 in d_demangle /home/test/tmp/radare2/libr/bin/mangling/cxx/cp-demangle.c:5573
    #8 0x7f781927370f in cplus_demangle_v3 /home/test/tmp/radare2/libr/bin/mangling/cxx/cp-demangle.c:5730
    #9 0x7f781924e01e in r_bin_demangle_cxx /home/test/tmp/radare2/libr/bin/demangle.c:147
    #10 0x7f78192508a9 in r_bin_demangle /home/test/tmp/radare2/libr/bin/demangle.c:474
    #11 0x7f781a4b6d38 in bin_imports /home/test/tmp/radare2/libr/core/cbin.c:1423
    #12 0x7f781a4aafd8 in r_core_bin_info /home/test/tmp/radare2/libr/core/cbin.c:2716
    #13 0x7f781a4aacb2 in r_core_bin_set_env /home/test/tmp/radare2/libr/core/cbin.c:109
    #14 0x7f781a435c6b in r_core_file_do_load_for_io_plugin /home/test/tmp/radare2/libr/core/file.c:434
    #15 0x7f781a432e07 in r_core_bin_load /home/test/tmp/radare2/libr/core/file.c:552
    #16 0x55d74e0fb408 in main /home/test/tmp/radare2/binr/radare2/radare2.c:898
    #17 0x7f781336882f in __libc_start_main /build/glibc-GKVZIf/glibc-2.23/csu/../csu/libc-start.c:291
    #18 0x55d74e026f38 in _start ??:?

AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (//home/test/tmp/radare2/libr/bin/libr_bin.so+0x103486)
==68948==ABORTING```
@Maijin Maijin added the fuzzing label Mar 5, 2017
@radare radare added this to the 1.3.0 milestone Mar 9, 2017
@radare radare closed this as completed in 8b0c318 Mar 9, 2017
@radare
Copy link
Collaborator

radare commented Mar 9, 2017

This vuln belongs to GNU binutils. Would you mind to test and report that to them?

Thanks!!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants