|
|
Message-ID: <CAATyssetqs4To7DdqFRrzJT-UF7Z1LoRkrraiL7dEqWK76BmvQ@mail.gmail.com>
Date: Mon, 16 Nov 2015 23:47:16 +0100
From: "Simon ." <bofh666ftw@...glemail.com>
To: oss-security@...ts.openwall.com
Subject: suckless sent and libxft-dev 2.3.2-1 crash
Hi,
please review, whether this needs a CVE.
Greetings
Simon
.
---------- Forwarded message ----------
From: "Simon ." <bofh666ftw@...glemail.com>
Date: Mon, 16 Nov 2015 23:37:57 +0100
Subject: sent segfaults Xft
To: dev@...kless.org
Hi,
installing "sent" failed for me. I needed to install libpng-dev + libxft-dev.
Running "sent" on some file:
simon@...hi3000:~/archive/sent$ file sent
sent: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically
linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32,
BuildID[sha1]=e3a0864f2be10dd5e1f749ed9443b8391d885c9b, not stripped
simon@...hi3000:~/archive/sent$ ls
arg.h config.mk drw.h LICENSE README.md sent.o util.o
config.def.h core.9840.9840 drw.o Makefile sent util.c
config.h drw.c example nyan.png sent.c util.h
simon@...hi3000:~/archive/sent$ ./sent /etc/passwd
Segmentation fault (core dumped)
simon@...hi3000:~/archive/sent$ gdb -q sent
Reading symbols from sent...done.
(gdb) r /etc/passwd
Starting program: /home/sk/archive/sent/sent /etc/passwd
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Program received signal SIGSEGV, Segmentation fault.
0x00007ffff74ff660 in XftCharExists ()
from /usr/lib/x86_64-linux-gnu/libXft.so.2
(gdb) l
655 shortcuts[i].func(&(shortcuts[i].arg));
656 }
657
658 void configure(XEvent *e)
659 {
660 resize(e->xconfigure.width, e->xconfigure.height);
661 if (slides[idx].img)
662 slides[idx].img->state &= ~(DRAWN | SCALED);
663 xdraw();
664 }
(gdb) disas 0x7ffff74ff660
Dump of assembler code for function XftCharExists:
=> 0x00007ffff74ff660 <+0>: mov 0x10(%rsi),%rdi
0x00007ffff74ff664 <+4>: test %rdi,%rdi
0x00007ffff74ff667 <+7>: je 0x7ffff74ff670 <XftCharExists+16>
0x00007ffff74ff669 <+9>: mov %edx,%esi
0x00007ffff74ff66b <+11>: jmpq 0x7ffff74f5dc0 <FcCharSetHasChar@plt>
0x00007ffff74ff670 <+16>: xor %eax,%eax
0x00007ffff74ff672 <+18>: retq
End of assembler dump.
Can anyone else reproduce?
Greetings
Simon
.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.