ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 9256] Radiotap decode appears broken

Date: Wed, 09 Oct 2013 19:02:45 +0000

Comment # 5 on bug 9256 from
(In reply to comment #4)
> So this was a regression caused by r52311 which fixed bug #9212.
> Specifically, the breaking change was the change to the ITERATOR_VALID macro
> on line 77 of packet-ieee80211-radiotap-iter.c. Reverting just that one line
> fixes this bug.
> 
> However, reverting that line also reintroduces one small part of bug #9212 -
> with the capture from that bug, valgrind produces:
> 
> ==32652== Invalid read of size 1
> ==32652==    at 0x67D675B: ieee80211_radiotap_iterator_init
> (packet-ieee80211-radiotap-iter.c:152)
> ==32652==    by 0x67D6CD2: dissect_radiotap
> (packet-ieee80211-radiotap.c:1038)
> ==32652==    by 0x648D2D3: call_dissector_through_handle (packet.c:492)
> ==32652==    by 0x648D98F: call_dissector_work (packet.c:586)
> ==32652==    by 0x648E24B: dissector_try_uint_new (packet.c:1017)
> ==32652==    by 0x648E2A6: dissector_try_uint (packet.c:1043)
> ==32652==    by 0x671AA22: dissect_frame (packet-frame.c:488)
> ==32652==    by 0x648D2D3: call_dissector_through_handle (packet.c:492)
> ==32652==    by 0x648D98F: call_dissector_work (packet.c:586)
> ==32652==    by 0x648F511: call_dissector_with_data (packet.c:2105)
> ==32652==    by 0x648F953: dissect_packet (packet.c:430)
> ==32652==    by 0x64822DD: epan_dissect_run_with_taps (epan.c:277)
> ==32652==  Address 0x106b79ef is 0 bytes after a block of size 47 alloc'd
> ==32652==    at 0x4C2A2DB: malloc (in
> /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
> ==32652==    by 0x94F2DC0: g_malloc (gmem.c:104)
> ==32652==    by 0x6EFBBDF: wmem_simple_alloc (wmem_allocator_simple.c:51)
> ==32652==    by 0x64BD265: tvb_memdup (tvbuff.c:774)
> ==32652==    by 0x67D6CA6: dissect_radiotap
> (packet-ieee80211-radiotap.c:1034)
> ==32652==    by 0x648D2D3: call_dissector_through_handle (packet.c:492)
> ==32652==    by 0x648D98F: call_dissector_work (packet.c:586)
> ==32652==    by 0x648E24B: dissector_try_uint_new (packet.c:1017)
> ==32652==    by 0x648E2A6: dissector_try_uint (packet.c:1043)
> ==32652==    by 0x671AA22: dissect_frame (packet-frame.c:488)
> ==32652==    by 0x648D2D3: call_dissector_through_handle (packet.c:492)
> ==32652==    by 0x648D98F: call_dissector_work (packet.c:586)
> 
> Perhaps someone more familiar with the protocol could figure out the right
> way to fix that without breaking proper dissection? The capture from this
> bug does not produce such an error, even with the change reverted.

Hi evan,

radiotap-iter* dissector come from radio tap stuff :
http://git.sipsolutions.net/?p=radiotap.git;a=blob;f=radiotap.c;h=00bff1c2970471e41d53a30b42b99b718fc750cd;hb=a83216771fbfa9f6cd838b5ee73b9ab52fb514b1

Do you have look there is the some issue in original code ?


You are receiving this mail because:
  • You are watching all bug changes.