bylins / mud

МПМ Былины
https://www.bylins.su/
Other
36 stars 26 forks source link

креш #2228

Closed bylins closed 2 months ago

bylins commented 2 months ago

откр мъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъъ

==698047==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffffffb950 at pc 0x555557ff0dd7 bp 0x7fffffffb6e0 sp 0x7fffffffb6d0 WRITE of size 1 at 0x7fffffffb950 thread T0

0 0x555557ff0dd6 in char one_argument_template<char>(char, char) (/home/stribog/mud/build/circle+0x2a9cdd6)

#1 0x555557fd2b1b in one_argument(char*, char*) /home/stribog/mud/src/interpreter.cpp:1650
#2 0x555557df2119 in generic_find(char*, unsigned int, CharData*, CharData**, ObjData**) /home/stribog/mud/src/handler.cpp:2360
#3 0x555558379fa6 in do_gen_door(CharData*, char*, int, int) /home/stribog/mud/src/act_movement.cpp:1428
#4 0x555557fd0a44 in command_interpreter(CharData*, char*) /home/stribog/mud/src/interpreter.cpp:1311
#5 0x5555572d9bee in process_io(int, int, epoll_event*) (/home/stribog/mud/build/circle+0x1d85bee)
#6 0x5555572bd870 in game_loop(int, int) /home/stribog/mud/src/comm.cpp:1441
#7 0x5555572bbdc0 in stop_game(unsigned short) /home/stribog/mud/src/comm.cpp:840
#8 0x5555572bb4e6 in main_function(int, char**) /home/stribog/mud/src/comm.cpp:781
#9 0x5555572b9de1 in main /home/stribog/mud/src/main.cpp:4
#10 0x7ffff7458d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#11 0x7ffff7458e3f in __libc_start_main_impl ../csu/libc-start.c:392
#12 0x5555571e44d4 in _start (/home/stribog/mud/build/circle+0x1c904d4)

Address 0x7fffffffb950 is located in stack of thread T0 at offset 320 in frame

0 0x555557df1f75 in generic_find(char, unsigned int, CharData, CharData, ObjData) /home/stribog/mud/src/handler.cpp:2349

This frame has 3 object(s): [32, 40) 'tmp' (line 2358) [64, 320) 'name' (line 2350) <== Memory access at offset 320 overflows this variable [384, 2432) 'tmpname' (line 2357) HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions are supported) SUMMARY: AddressSanitizer: stack-buffer-overflow (/home/stribog/mud/build/circle+0x2a9cdd6) in char one_argument_template<char>(char, char) Shadow bytes around the buggy address: 0x10007fff76d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff76e0: 00 00 f1 f1 f1 f1 00 f3 f3 f3 00 00 00 00 00 00 0x10007fff76f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7700: 00 00 f1 f1 f1 f1 00 f2 f2 f2 00 00 00 00 00 00 0x10007fff7710: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x10007fff7720: 00 00 00 00 00 00 00 00 00 00[f2]f2 f2 f2 f2 f2 0x10007fff7730: f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7740: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7750: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7760: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7770: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==698047==ABORTING