Bug 1151636 - [abrt] bash: strlen(): bash killed by SIGSEGV
Summary: [abrt] bash: strlen(): bash killed by SIGSEGV
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Fedora
Classification: Fedora
Component: bash
Version: 21
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Ondrej Oprala
QA Contact: Fedora Extras Quality Assurance
URL: https://retrace.fedoraproject.org/faf...
Whiteboard: abrt_hash:c11055e6805e815490ea573557a...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-10-10 21:06 UTC by Anonymous
Modified: 2016-02-01 02:10 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2015-01-16 16:51:41 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
File: backtrace (37.31 KB, text/plain)
2014-10-10 21:06 UTC, Anonymous
no flags Details
File: cgroup (190 bytes, text/plain)
2014-10-10 21:06 UTC, Anonymous
no flags Details
File: core_backtrace (3.16 KB, text/plain)
2014-10-10 21:06 UTC, Anonymous
no flags Details
File: dso_list (575 bytes, text/plain)
2014-10-10 21:06 UTC, Anonymous
no flags Details
File: environ (2.62 KB, text/plain)
2014-10-10 21:06 UTC, Anonymous
no flags Details
File: exploitable (117 bytes, text/plain)
2014-10-10 21:06 UTC, Anonymous
no flags Details
File: limits (1.29 KB, text/plain)
2014-10-10 21:06 UTC, Anonymous
no flags Details
File: maps (2.52 KB, text/plain)
2014-10-10 21:06 UTC, Anonymous
no flags Details
File: open_fds (133 bytes, text/plain)
2014-10-10 21:06 UTC, Anonymous
no flags Details
File: proc_pid_status (931 bytes, text/plain)
2014-10-10 21:06 UTC, Anonymous
no flags Details
File: var_log_messages (494 bytes, text/plain)
2014-10-10 21:06 UTC, Anonymous
no flags Details

Description Anonymous 2014-10-10 21:06:31 UTC
Description of problem:
I have probably run bashcheck script which tests for ShellShock vulnerability.

Version-Release number of selected component:
bash-4.3.25-2.fc21

Additional info:
reporter:       libreport-2.2.3
backtrace_rating: 4
cmdline:        /usr/bin/bash -c 'f(){ x(){ _;};x(){ _;}<<a;}'
crash_function: strlen
executable:     /usr/bin/bash
kernel:         3.16.3-302.fc21.x86_64
runlevel:       N 5
type:           CCpp
uid:            1002

Truncated backtrace:
Thread no. 1 (10 frames)
 #0 strlen at ../sysdeps/x86_64/strlen.S:106
 #1 copy_redirect at copy_cmd.c:129
 #2 copy_redirects at copy_cmd.c:164
 #3 copy_command at copy_cmd.c:371
 #4 copy_function_def_contents at copy_cmd.c:335
 #5 bind_function_def at variables.c:2890
 #6 make_function_def at make_cmd.c:801
 #7 yyparse at ./parse.y:905
 #8 parse_command at eval.c:239
 #9 parse_and_execute at evalstring.c:299

Potential duplicate: bug 1148661

Comment 1 Anonymous 2014-10-10 21:06:34 UTC
Created attachment 945833 [details]
File: backtrace

Comment 2 Anonymous 2014-10-10 21:06:36 UTC
Created attachment 945834 [details]
File: cgroup

Comment 3 Anonymous 2014-10-10 21:06:37 UTC
Created attachment 945835 [details]
File: core_backtrace

Comment 4 Anonymous 2014-10-10 21:06:38 UTC
Created attachment 945836 [details]
File: dso_list

Comment 5 Anonymous 2014-10-10 21:06:39 UTC
Created attachment 945837 [details]
File: environ

Comment 6 Anonymous 2014-10-10 21:06:40 UTC
Created attachment 945838 [details]
File: exploitable

Comment 7 Anonymous 2014-10-10 21:06:42 UTC
Created attachment 945839 [details]
File: limits

Comment 8 Anonymous 2014-10-10 21:06:43 UTC
Created attachment 945840 [details]
File: maps

Comment 9 Anonymous 2014-10-10 21:06:44 UTC
Created attachment 945841 [details]
File: open_fds

Comment 10 Anonymous 2014-10-10 21:06:45 UTC
Created attachment 945842 [details]
File: proc_pid_status

Comment 11 Anonymous 2014-10-10 21:06:47 UTC
Created attachment 945843 [details]
File: var_log_messages

Comment 12 Ondrej Oprala 2015-01-16 16:51:41 UTC
Hey Łukasz,
this should now be fixed, please reopen this bug if you still experience this issue.


Note You need to log in before you can comment on or make changes to this bug.