ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
July 17th, 2024 | 10:00am-11:55am SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 10486] New: access violation in libpcre

Date: Fri, 19 Sep 2014 15:23:58 +0000
Bug ID 10486
Summary access violation in libpcre
Product Wireshark
Version unspecified
Hardware x86
OS Debian
Status UNCONFIRMED
Severity Major
Priority Low
Component Capture file support (libwiretap)
Assignee [email protected]
Reporter [email protected]

Created attachment 13077 [details]
file that crashes wireshark/tshark

Build Information:
TShark (Wireshark) 1.99.0 (v1.99.0-rc1-1764-gfee9277 from master)

Copyright 1998-2014 Gerald Combs <[email protected]> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with libpcap, without POSIX capabilities, without libnl, with
libz 1.2.7, with GLib 2.32.4, without SMI, without c-ares, without ADNS,
without
Lua, without GnuTLS, without Gcrypt, without Kerberos, without GeoIP.

Running on Linux 3.14-kali1-amd64, with locale en_GB.UTF-8, with libpcap
version
1.3.0, with libz 1.2.7.
      Intel(R) Core(TM) i7-2720QM CPU @ 2.20GHz (with SSE4.2)

Built using gcc 4.7.2.

--
I have the non-crash file if needed (1-byte changed)

==4133== Memcheck, a memory error detector
==4133== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==4133== Using Valgrind-3.9.0 and LibVEX; rerun with -h for copyright info
==4133== Command: tshark -r case2
==4133== Parent PID: 4008
==4133== 
==4133== 
==4133== Process terminating with default action of signal 11 (SIGSEGV)
==4133==  Bad permissions for mapped region at address 0xAD77717
==4133==    at 0xACE34EA: ??? (in /lib/x86_64-linux-gnu/libpcre.so.3.13.1)
==4133==    by 0xACF177B: pcre_exec (in
/lib/x86_64-linux-gnu/libpcre.so.3.13.1)
==4133==    by 0x99E2707: g_match_info_next (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.4)
==4133==    by 0x99E34FE: g_regex_match_full (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.4)
==4133==    by 0x99E3654: g_regex_match_simple (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.4)
==4133==    by 0x4E4CED8: logcat_text_open (logcat_text.c:286)
==4133==    by 0x4E440A0: wtap_open_offline (file_access.c:984)
==4133==    by 0x41440D: cf_open (tshark.c:4023)
==4133==    by 0x40CAB7: main (tshark.c:2080)
==4133== 
==4133== HEAP SUMMARY:
==4133==     in use at exit: 15,133,398 bytes in 153,882 blocks
==4133==   total heap usage: 202,348 allocs, 48,466 frees, 27,257,918 bytes
allocated
==4133== 
==4133== LEAK SUMMARY:
==4133==    definitely lost: 29 bytes in 4 blocks
==4133==    indirectly lost: 0 bytes in 0 blocks
==4133==      possibly lost: 300,908 bytes in 2,831 blocks
==4133==    still reachable: 14,832,461 bytes in 151,047 blocks
==4133==         suppressed: 0 bytes in 0 blocks
==4133== Rerun with --leak-check=full to see details of leaked memory
==4133== 
==4133== For counts of detected and suppressed errors, rerun with: -v
==4133== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 41 from 5)


You are receiving this mail because:
  • You are watching all bug changes.