Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 12 Dec 2013 05:50:53 GMT
From:      Phil Stone <phil.stone@gmx.com>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   ports/184715: pkg audit -F segfault
Message-ID:  <201312120550.rBC5orFc079896@oldred.freebsd.org>
Resent-Message-ID: <201312120600.rBC600TW021591@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         184715
>Category:       ports
>Synopsis:       pkg audit -F segfault
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Thu Dec 12 06:00:00 UTC 2013
>Closed-Date:
>Last-Modified:
>Originator:     Phil Stone
>Release:        FreeBSD 8.4-RELEASE-p6
>Organization:
>Environment:
FreeBSD phildek.dev 8.4-RELEASE-p4 FreeBSD 8.4-RELEASE-p4 #0: Mon Sep  9 23:16:13 UTC 2013     root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC  amd64
>Description:
Hi,
I've just installed pkg-1.2.3 on FreeBSD 8.4-RELEASE-p6.

Running the command "pkg audit -F" causes a segfault:
# pkg audit -F
Vulnxml file up-to-date.
Segmentation fault (core dumped)
#

>How-To-Repeat:
100% repeatable: just type 'pkg audit -F' on the command prompt

>Fix:
Implementing the following patch solves the issue:
--- audit_orig.c 2013-12-11 03:36:21.390625000 +0100
+++ audit.c 2013-12-11 03:36:59.796875000 +0100
@@ -206,9 +206,10 @@
 
        cleanup:
        unlink(tmp);
-       if (a != NULL)
+       if (a != NULL) {
                archive_read_close(a);
                archive_read_free(a);
+       }
        if (fd >= 0)
                close(fd);



>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201312120550.rBC5orFc079896>