Skip to content

Instantly share code, notes, and snippets.

@iagox86
Created October 9, 2020 19:31
Show Gist options
  • Save iagox86/499832b190b762f6b33770e160c5db3d to your computer and use it in GitHub Desktop.
Save iagox86/499832b190b762f6b33770e160c5db3d to your computer and use it in GitHub Desktop.
[root@dev .libs]# cd ~ron/sudo/src/.libs/; valgrind ./sudo -U chris -ll
==762347== Memcheck, a memory error detector
==762347== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==762347== Using Valgrind-3.16.1 and LibVEX; rerun with -h for copyright info
==762347== Command: ./sudo -U chris -ll
==762347==
==762348== Warning: invalid file descriptor 1024 in syscall close()
==762348== Warning: invalid file descriptor 1025 in syscall close()
==762348== Warning: invalid file descriptor 1026 in syscall close()
==762348== Warning: invalid file descriptor 1027 in syscall close()
==762348== Use --log-fd=<number> to select an alternative log fd.
==762348== Warning: invalid file descriptor 1028 in syscall close()
==762348== Warning: invalid file descriptor 1029 in syscall close()
==762347== Conditional jump or move depends on uninitialised value(s)
==762347== at 0x12A90AA6: sss_rule_to_priv (sssd.c:335)
==762347== by 0x12A90AA6: sss_to_sudoers (sssd.c:398)
==762347== by 0x12A90AA6: sudo_sss_query (sssd.c:684)
==762347== by 0x12A8185F: display_privs (parse.c:753)
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560)
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041)
==762347== by 0x10EAE0: policy_list (sudo.c:1223)
==762347== by 0x10EAE0: main (sudo.c:262)
==762347==
==762347== Conditional jump or move depends on uninitialised value(s)
==762347== at 0x484C1E7: sss_sudo_free_values (sss_sudo.c:187)
==762347== by 0x12A90AAE: sss_rule_to_priv (sssd.c:336)
==762347== by 0x12A90AAE: sss_to_sudoers (sssd.c:398)
==762347== by 0x12A90AAE: sudo_sss_query (sssd.c:684)
==762347== by 0x12A8185F: display_privs (parse.c:753)
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560)
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041)
==762347== by 0x10EAE0: policy_list (sudo.c:1223)
==762347== by 0x10EAE0: main (sudo.c:262)
==762347==
==762347== Use of uninitialised value of size 8
==762347== at 0x484C1F2: sss_sudo_free_values (sss_sudo.c:191)
==762347== by 0x484C1F2: sss_sudo_free_values (sss_sudo.c:183)
==762347== by 0x12A90AAE: sss_rule_to_priv (sssd.c:336)
==762347== by 0x12A90AAE: sss_to_sudoers (sssd.c:398)
==762347== by 0x12A90AAE: sudo_sss_query (sssd.c:684)
==762347== by 0x12A8185F: display_privs (parse.c:753)
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560)
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041)
==762347== by 0x10EAE0: policy_list (sudo.c:1223)
==762347== by 0x10EAE0: main (sudo.c:262)
==762347==
==762347== Conditional jump or move depends on uninitialised value(s)
==762347== at 0x484C1F8: sss_sudo_free_values (sss_sudo.c:191)
==762347== by 0x484C1F8: sss_sudo_free_values (sss_sudo.c:183)
==762347== by 0x12A90AAE: sss_rule_to_priv (sssd.c:336)
==762347== by 0x12A90AAE: sss_to_sudoers (sssd.c:398)
==762347== by 0x12A90AAE: sudo_sss_query (sssd.c:684)
==762347== by 0x12A8185F: display_privs (parse.c:753)
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560)
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041)
==762347== by 0x10EAE0: policy_list (sudo.c:1223)
==762347== by 0x10EAE0: main (sudo.c:262)
==762347==
==762347== Conditional jump or move depends on uninitialised value(s)
==762347== at 0x483B9A8: free (vg_replace_malloc.c:538)
==762347== by 0x484C204: sss_sudo_free_values (sss_sudo.c:192)
==762347== by 0x484C204: sss_sudo_free_values (sss_sudo.c:183)
==762347== by 0x12A90AAE: sss_rule_to_priv (sssd.c:336)
==762347== by 0x12A90AAE: sss_to_sudoers (sssd.c:398)
==762347== by 0x12A90AAE: sudo_sss_query (sssd.c:684)
==762347== by 0x12A8185F: display_privs (parse.c:753)
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560)
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041)
==762347== by 0x10EAE0: policy_list (sudo.c:1223)
==762347== by 0x10EAE0: main (sudo.c:262)
==762347==
==762347== Invalid free() / delete / delete[] / realloc()
==762347== at 0x483B9F5: free (vg_replace_malloc.c:538)
==762347== by 0x484C204: sss_sudo_free_values (sss_sudo.c:192)
==762347== by 0x484C204: sss_sudo_free_values (sss_sudo.c:183)
==762347== by 0x12A90AAE: sss_rule_to_priv (sssd.c:336)
==762347== by 0x12A90AAE: sss_to_sudoers (sssd.c:398)
==762347== by 0x12A90AAE: sudo_sss_query (sssd.c:684)
==762347== by 0x12A8185F: display_privs (parse.c:753)
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560)
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041)
==762347== by 0x10EAE0: policy_list (sudo.c:1223)
==762347== by 0x10EAE0: main (sudo.c:262)
==762347== Address 0x440 is not stack'd, malloc'd or (recently) free'd
==762347==
==762347== Use of uninitialised value of size 8
==762347== at 0x484C205: sss_sudo_free_values (sss_sudo.c:191)
==762347== by 0x484C205: sss_sudo_free_values (sss_sudo.c:183)
==762347== by 0x12A90AAE: sss_rule_to_priv (sssd.c:336)
==762347== by 0x12A90AAE: sss_to_sudoers (sssd.c:398)
==762347== by 0x12A90AAE: sudo_sss_query (sssd.c:684)
==762347== by 0x12A8185F: display_privs (parse.c:753)
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560)
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041)
==762347== by 0x10EAE0: policy_list (sudo.c:1223)
==762347== by 0x10EAE0: main (sudo.c:262)
==762347==
==762347== Conditional jump or move depends on uninitialised value(s)
==762347== at 0x483B9A8: free (vg_replace_malloc.c:538)
==762347== by 0x12A90AAE: sss_rule_to_priv (sssd.c:336)
==762347== by 0x12A90AAE: sss_to_sudoers (sssd.c:398)
==762347== by 0x12A90AAE: sudo_sss_query (sssd.c:684)
==762347== by 0x12A8185F: display_privs (parse.c:753)
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560)
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041)
==762347== by 0x10EAE0: policy_list (sudo.c:1223)
==762347== by 0x10EAE0: main (sudo.c:262)
==762347==
==762347== Invalid free() / delete / delete[] / realloc()
==762347== at 0x483B9F5: free (vg_replace_malloc.c:538)
==762347== by 0x12A90AAE: sss_rule_to_priv (sssd.c:336)
==762347== by 0x12A90AAE: sss_to_sudoers (sssd.c:398)
==762347== by 0x12A90AAE: sudo_sss_query (sssd.c:684)
==762347== by 0x12A8185F: display_privs (parse.c:753)
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560)
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041)
==762347== by 0x10EAE0: policy_list (sudo.c:1223)
==762347== by 0x10EAE0: main (sudo.c:262)
==762347== Address 0x1fff000630 is on thread 1's stack
==762347== in frame #2, created by display_privs (parse.c:700)
==762347==
Matching Defaults entries for chris on dev:
!visiblepw, always_set_home, match_group_by_gid, always_query_group_plugin, env_reset, env_keep="COLORS DISPLAY HOSTNAME HISTSIZE KDEDIR LS_COLORS", env_keep+="MAIL QTDIR USERNAME LANG
LC_ADDRESS LC_CTYPE", env_keep+="LC_COLLATE LC_IDENTIFICATION LC_MEASUREMENT LC_MESSAGES", env_keep+="LC_MONETARY LC_NAME LC_NUMERIC LC_PAPER LC_TELEPHONE", env_keep+="LC_TIME LC_ALL
LANGUAGE LINGUAS _XKB_CHARSET XAUTHORITY", secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/var/lib/snapd/snap/bin
User chris may run the following commands on dev:
LDAP Role: %LinuxAdmins
RunAsUsers: ALL
RunAsGroups: ALL
Options: timestamp_timeout=60, !env_reset, !always_set_home
Commands:
ALL
==762347==
==762347== HEAP SUMMARY:
==762347== in use at exit: 115,799 bytes in 601 blocks
==762347== total heap usage: 6,592 allocs, 5,993 frees, 1,257,493 bytes allocated
==762347==
==762347== LEAK SUMMARY:
==762347== definitely lost: 448 bytes in 2 blocks
==762347== indirectly lost: 317 bytes in 8 blocks
==762347== possibly lost: 117 bytes in 2 blocks
==762347== still reachable: 114,869 bytes in 588 blocks
==762347== suppressed: 48 bytes in 1 blocks
==762347== Rerun with --leak-check=full to see details of leaked memory
==762347==
==762347== Use --track-origins=yes to see where uninitialised values come from
==762347== For lists of detected and suppressed errors, rerun with: -s
==762347== ERROR SUMMARY: 9 errors from 9 contexts (suppressed: 0 from 0)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment