ps: stack smashing attack in function pr_args()

Discuss usability issues, general maintenance, and general support issues for a grsecurity-enabled system.

ps: stack smashing attack in function pr_args()

Postby amax » Mon Jan 10, 2005 11:59 pm

I use sys-apps/psmisc-21.5

if I run 'ps pax' command in my konsole root shell
witch have not fullscreen size (small size), then
I got:


=================================================
16951 ? Ss 0:00 /usr/sbin/gpm -m /dev/input/mice -t imps2 -l "a-zA-Z0
11739 ? Ss 0:00 /usr/sbin/smbd -D
27225 ? S 0:00 \_ /usr/sbin/smbd -D
25127 ? S 0:00 \_ /usr/sbin/smbd -D
10403 ? Ss 0:00 /usr/sbin/nmbd -D
22922 ? S 0:00 /usr/sbin/smartd -p /var/run/smartd.pid
4828 ? Ss 0:00 /usr/sbin/sshd
17968 ? Ss 0:00 /usr/sbin/cron
ps: stack smashing attack in function pr_args()
Aborted
amazing ~ #
=================================================

BUT if expand to fullscreen (maximize), then all ok!

What should I do ? ;)
amax
 
Posts: 10
Joined: Wed Jul 14, 2004 5:53 am

Re: ps: stack smashing attack in function pr_args()

Postby PaX Team » Tue Jan 11, 2005 11:29 am

amax wrote:ps: stack smashing attack in function pr_args()
Aborted
amazing ~ #
=================================================

BUT if expand to fullscreen (maximize), then all ok!

What should I do ? ;)
report it in the gentoo bugzilla. you'll probably be asked for extra information, so you might as well do some debugging first: run ps in gdb and when it aborts, get some information like: 'bt', 'info reg', 'x/16i $pc', 'x/16x $sp'. you can also enable coredumping and run the above commands on the core (in this case it's better to disable randomization on ps).
PaX Team
 
Posts: 2310
Joined: Mon Mar 18, 2002 4:35 pm


Return to grsecurity support