Date: Thu, 12 Dec 2013 05:50:53 GMT From: Phil Stone <phil.stone@gmx.com> To: freebsd-gnats-submit@FreeBSD.org Subject: ports/184715: pkg audit -F segfault Message-ID: <201312120550.rBC5orFc079896@oldred.freebsd.org> Resent-Message-ID: <201312120600.rBC600TW021591@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 184715 >Category: ports >Synopsis: pkg audit -F segfault >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Thu Dec 12 06:00:00 UTC 2013 >Closed-Date: >Last-Modified: >Originator: Phil Stone >Release: FreeBSD 8.4-RELEASE-p6 >Organization: >Environment: FreeBSD phildek.dev 8.4-RELEASE-p4 FreeBSD 8.4-RELEASE-p4 #0: Mon Sep 9 23:16:13 UTC 2013 root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC amd64 >Description: Hi, I've just installed pkg-1.2.3 on FreeBSD 8.4-RELEASE-p6. Running the command "pkg audit -F" causes a segfault: # pkg audit -F Vulnxml file up-to-date. Segmentation fault (core dumped) # >How-To-Repeat: 100% repeatable: just type 'pkg audit -F' on the command prompt >Fix: Implementing the following patch solves the issue: --- audit_orig.c 2013-12-11 03:36:21.390625000 +0100 +++ audit.c 2013-12-11 03:36:59.796875000 +0100 @@ -206,9 +206,10 @@ cleanup: unlink(tmp); - if (a != NULL) + if (a != NULL) { archive_read_close(a); archive_read_free(a); + } if (fd >= 0) close(fd); >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201312120550.rBC5orFc079896>