Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 910393 - games-action/battalion: "*** stack smashing detected ***: terminated"
Summary: games-action/battalion: "*** stack smashing detected ***: terminated"
Status: UNCONFIRMED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Current packages (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Games
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-07-15 11:35 UTC by Alexis
Modified: 2023-07-15 11:42 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments
Output of `emerge --info` (emerge.info,9.31 KB, text/plain)
2023-07-15 11:35 UTC, Alexis
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Alexis 2023-07-15 11:35:51 UTC
Created attachment 865532 [details]
Output of `emerge --info`

Running `battalion`, followed by SPC and then 6 results in:

    *** stack smashing detected ***: terminated

Re-building with "-Og -fsanitize=address -static-libasan -g" in CFLAGS and "nostrip" in FEATURES, followed by the above procedure, results in:

    ==23550==ERROR: AddressSanitizer: heap-use-after-free on address 0x60800001abd0 at pc 0x56361dffbe9b bp 0x7ffd2c610430 sp 0x7ffd2c610420
    READ of size 4 at 0x60800001abd0 thread T0
        #0 0x56361dffbe9a in checkForBlock /var/tmp/portage/games-action/battalion-1.4b-r2/work/battalion1.4b/battalion.c:463
        #1 0x56361e002d22 in addNewTank /var/tmp/portage/games-action/battalion-1.4b-r2/work/battalion1.4b/battalion.c:1958
        #2 0x56361e004835 in setPlayConditions /var/tmp/portage/games-action/battalion-1.4b-r2/work/battalion1.4b/battalion.c:2324
        #3 0x56361e007533 in demoKeys /var/tmp/portage/games-action/battalion-1.4b-r2/work/battalion1.4b/battalion.c:3221
        #4 0x56361e0077a8 in processKey /var/tmp/portage/games-action/battalion-1.4b-r2/work/battalion1.4b/battalion.c:3330
        #5 0x56361e042737 in DoNextEvent /var/tmp/portage/games-action/battalion-1.4b-r2/work/battalion1.4b/tk.c:387
        #6 0x56361e0436ff in tkExec /var/tmp/portage/games-action/battalion-1.4b-r2/work/battalion1.4b/tk.c:429
        #7 0x56361e01034c in main /var/tmp/portage/games-action/battalion-1.4b-r2/work/battalion1.4b/battalion.c:5591
        #8 0x7f055bd19989  (/lib64/libc.so.6+0x23989)
        #9 0x7f055bd19a44 in __libc_start_main (/lib64/libc.so.6+0x23a44)
        #10 0x56361deeba20 in _start (/usr/bin/battalion+0x1da20)

    0x60800001abd0 is located 48 bytes inside of 96-byte region [0x60800001aba0,0x60800001ac00)
    freed by thread T0 here:
        #0 0x56361dfa3b48 in __interceptor_free.part.0 (/usr/bin/battalion+0xd5b48)
        #1 0x56361e00445d in setPlayConditions /var/tmp/portage/games-action/battalion-1.4b-r2/work/battalion1.4b/battalion.c:2225
        #2 0x56361e007533 in demoKeys /var/tmp/portage/games-action/battalion-1.4b-r2/work/battalion1.4b/battalion.c:3221

    previously allocated by thread T0 here:
        #0 0x56361dfa5087 in __interceptor_malloc (/usr/bin/battalion+0xd7087)
        #1 0x56361e0027d6 in addNewTank /var/tmp/portage/games-action/battalion-1.4b-r2/work/battalion1.4b/battalion.c:1872

    SUMMARY: AddressSanitizer: heap-use-after-free /var/tmp/portage/games-action/battalion-1.4b-r2/work/battalion1.4b/battalion.c:463 in checkForBlock
    Shadow bytes around the buggy address:
      0x60800001a900: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
      0x60800001a980: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
      0x60800001aa00: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
      0x60800001aa80: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
      0x60800001ab00: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
    =>0x60800001ab80: fa fa fa fa fd fd fd fd fd fd[fd]fd fd fd fd fd
      0x60800001ac00: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 fa
      0x60800001ac80: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
      0x60800001ad00: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
      0x60800001ad80: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
      0x60800001ae00: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00
    Shadow byte legend (one shadow byte represents 8 application bytes):
      Addressable:           00
      Partially addressable: 01 02 03 04 05 06 07 
      Heap left redzone:       fa
      Freed heap region:       fd
      Stack left redzone:      f1
      Stack mid redzone:       f2
      Stack right redzone:     f3
      Stack after return:      f5
      Stack use after scope:   f8
      Global redzone:          f9
      Global init order:       f6
      Poisoned by user:        f7
      Container overflow:      fc
      Array cookie:            ac
      Intra object redzone:    bb
      ASan internal:           fe
      Left alloca redzone:     ca
      Right alloca redzone:    cb
    ==23550==ABORTING

Output of `emerge --info` attached.