Page 1 of 1

ps: stack smashing attack in function pr_args()

PostPosted: Mon Jan 10, 2005 11:59 pm
by amax
I use sys-apps/psmisc-21.5

if I run 'ps pax' command in my konsole root shell
witch have not fullscreen size (small size), then
I got:


=================================================
16951 ? Ss 0:00 /usr/sbin/gpm -m /dev/input/mice -t imps2 -l "a-zA-Z0
11739 ? Ss 0:00 /usr/sbin/smbd -D
27225 ? S 0:00 \_ /usr/sbin/smbd -D
25127 ? S 0:00 \_ /usr/sbin/smbd -D
10403 ? Ss 0:00 /usr/sbin/nmbd -D
22922 ? S 0:00 /usr/sbin/smartd -p /var/run/smartd.pid
4828 ? Ss 0:00 /usr/sbin/sshd
17968 ? Ss 0:00 /usr/sbin/cron
ps: stack smashing attack in function pr_args()
Aborted
amazing ~ #
=================================================

BUT if expand to fullscreen (maximize), then all ok!

What should I do ? ;)

Re: ps: stack smashing attack in function pr_args()

PostPosted: Tue Jan 11, 2005 11:29 am
by PaX Team
amax wrote:ps: stack smashing attack in function pr_args()
Aborted
amazing ~ #
=================================================

BUT if expand to fullscreen (maximize), then all ok!

What should I do ? ;)
report it in the gentoo bugzilla. you'll probably be asked for extra information, so you might as well do some debugging first: run ps in gdb and when it aborts, get some information like: 'bt', 'info reg', 'x/16i $pc', 'x/16x $sp'. you can also enable coredumping and run the above commands on the core (in this case it's better to disable randomization on ps).