On Thu, Jun 11, 2020 at 03:15:55PM +0200, Romero Pérez, Abel wrote:

> I've got a: man(13835) in free(): bogus pointer (double free?) 0x22c43c2813b
> 
> To check please, add the following function to .kshrc and run . ./.kshrc:
> 
> 
> function man {
>     set -A array "$@"
>     tag=${array[$#-1]}
>     PAGER="" MANPAGER="" /usr/bin/man -T html -c pfctl $@ > /tmp/man.html |
> lynx /tmp/man.html#$tag
>     #PAGER="" MANPAGER="" /usr/bin/man -T html -c $@ | lynx -stdin
> }
> 
> Then launch on prompt: man id
> 
> 
> The result if exploited is on screenshot, but on console as follows:
> 
> foo$ man id
> Abort trap
> foo$
> 

This already trips the bug;

        man -T html -c pfctl id

No need for a custom man function. No clue yet why.

        -Otto

Reply via email to