[Wireshark-bugs] [Bug 13637] [oss-fuzz] UBSAN: null pointer passed as argument 1, which is declared to never be null in wmem_map.c:419:57

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13637 Jaap Keuter changed: What|Removed |Added Status|CONFIRMED |IN_PROGRESS

[Wireshark-bugs] [Bug 13637] [oss-fuzz] UBSAN: null pointer passed as argument 1, which is declared to never be null in wmem_map.c:419:57

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13637 --- Comment #2 from Gerrit Code Review --- Change 21280 had a related patch set uploaded by Jaap Keuter: ROS: Harden ROS dissection https://code.wireshark.org/review/21280 -- You are receiving this

[Wireshark-bugs] [Bug 13637] [oss-fuzz] UBSAN: null pointer passed as argument 1, which is declared to never be null in wmem_map.c:419:57

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13637 --- Comment #4 from Gerrit Code Review --- Change 21283 had a related patch set uploaded by Michael Mann: ROS: Harden ROS dissection https://code.wireshark.org/review/21283 -- You are receiving this

[Wireshark-bugs] [Bug 13637] [oss-fuzz] UBSAN: null pointer passed as argument 1, which is declared to never be null in wmem_map.c:419:57

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13637 Michael Mann changed: What|Removed |Added Hardware|x86-64 |All

[Wireshark-bugs] [Bug 13637] [oss-fuzz] UBSAN: null pointer passed as argument 1, which is declared to never be null in wmem_map.c:419:57

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13637 --- Comment #3 from Gerrit Code Review --- Change 21280 merged by Michael Mann: ROS: Harden ROS dissection https://code.wireshark.org/review/21280 -- You are receiving this mail because: You are

[Wireshark-bugs] [Bug 13608] [oss-fuzz] ASAN: heap-buffer-overflow epan/dissectors/packet-dof.c:3899:32 in OALMarshal_UncompressValue

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13608 --- Comment #4 from Gerrit Code Review --- Change 21287 had a related patch set uploaded by Björn Ruytenberg: DOF: Fix buffer overflow (read) https://code.wireshark.org/review/21287 -- You are

[Wireshark-bugs] [Bug 13646] New: [oss-fuzz] UBSAN: null pointer passed as argument 1, which is declared to never be null in packet-rgmp.c:73:16

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13646 Bug ID: 13646 Summary: [oss-fuzz] UBSAN: null pointer passed as argument 1, which is declared to never be null in packet-rgmp.c:73:16 Product: Wireshark

[Wireshark-bugs] [Bug 13646] [oss-fuzz] UBSAN: null pointer passed as argument 1, which is declared to never be null in packet-rgmp.c:73:16

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13646 --- Comment #1 from Peter Wu --- Created attachment 15494 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=15494=edit Packet capture file -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13646] [oss-fuzz] UBSAN: null pointer passed as argument 1, which is declared to never be null in packet-rgmp.c:73:16

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13646 --- Comment #2 from Peter Wu --- This was originally reported as https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1170 -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13624] [oss-fuzz] UBSAN: index 2049 out of bounds for type 'char [2049]' in packet-quakeworld.c:134:5

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13624 --- Comment #7 from Gerrit Code Review --- Change 21286 merged by Michael Mann: packet-quakeworld.c: Fix potential out of bounds error. https://code.wireshark.org/review/21286 -- You are receiving

[Wireshark-bugs] [Bug 13631] [oss-fuzz] timeout: check_slsk_format epan/dissectors/packet-slsk.c:280:11

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13631 --- Comment #3 from Gerrit Code Review --- Change 21284 had a related patch set uploaded by Peter Wu: slsk: fix infinite loop https://code.wireshark.org/review/21284 -- You are receiving this mail

[Wireshark-bugs] [Bug 13639] [oss-fuzz] UBSAN: shift exponent 35 is too large for 32-bit type 'int' in packet-netsync.c:467:25

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13639 --- Comment #1 from Peter Wu --- Created attachment 15487 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=15487=edit Packet capture file -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13592] GSM SMS dissector does not take into account lower layer info for reassembly

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13592 hhw changed: What|Removed |Added Priority|Low |Medium -- You are

[Wireshark-bugs] [Bug 13637] [oss-fuzz] UBSAN: null pointer passed as argument 1, which is declared to never be null in wmem_map.c:419:57

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13637 --- Comment #5 from Gerrit Code Review --- Change 21283 merged by Michael Mann: ROS: Harden ROS dissection https://code.wireshark.org/review/21283 -- You are receiving this mail because: You are

[Wireshark-bugs] [Bug 13639] New: [oss-fuzz] UBSAN: shift exponent 35 is too large for 32-bit type 'int' in packet-netsync.c:467:25

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13639 Bug ID: 13639 Summary: [oss-fuzz] UBSAN: shift exponent 35 is too large for 32-bit type 'int' in packet-netsync.c:467:25 Product: Wireshark Version: Git Hardware:

[Wireshark-bugs] [Bug 13640] [oss-fuzz] UBSAN: shift exponent -3 is negative in proto.c:10593:38

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13640 --- Comment #1 from Peter Wu --- Created attachment 15488 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=15488=edit Packet capture file -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13640] New: [oss-fuzz] UBSAN: shift exponent -3 is negative in proto.c:10593:38

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13640 Bug ID: 13640 Summary: [oss-fuzz] UBSAN: shift exponent -3 is negative in proto.c:10593:38 Product: Wireshark Version: Git Hardware: x86-64 URL:

[Wireshark-bugs] [Bug 13642] [oss-fuzz] ASAN: heap-buffer-overflow (run/tshark+0x100447) in __interceptor_strncmp.part.74

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13642 --- Comment #1 from Peter Wu --- Created attachment 15490 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=15490=edit Packet capture file -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13642] New: [oss-fuzz] ASAN: heap-buffer-overflow (run/tshark+0x100447) in __interceptor_strncmp.part.74

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13642 Bug ID: 13642 Summary: [oss-fuzz] ASAN: heap-buffer-overflow (run/tshark+0x100447) in __interceptor_strncmp.part.74 Product: Wireshark Version: Git Hardware: x86-64

[Wireshark-bugs] [Bug 13643] New: [oss-fuzz] ASAN: heap-buffer-overflow epan/dissectors/packet-dof.c:3899:32 in OALMarshal_UncompressValue

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13643 Bug ID: 13643 Summary: [oss-fuzz] ASAN: heap-buffer-overflow epan/dissectors/packet-dof.c:3899:32 in OALMarshal_UncompressValue Product: Wireshark

[Wireshark-bugs] [Bug 13608] [oss-fuzz] ASAN: heap-buffer-overflow epan/dissectors/packet-dof.c:3899:32 in OALMarshal_UncompressValue

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13608 --- Comment #3 from Peter Wu --- *** Bug 13643 has been marked as a duplicate of this bug. *** -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13644] [oss-fuzz] UBSAN: index 2049 out of bounds for type 'char [2049]' in packet-quakeworld.c:134:5

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13644 --- Comment #1 from Peter Wu --- Created attachment 15492 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=15492=edit Packet capture file -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13644] New: [oss-fuzz] UBSAN: index 2049 out of bounds for type 'char [2049]' in packet-quakeworld.c:134:5

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13644 Bug ID: 13644 Summary: [oss-fuzz] UBSAN: index 2049 out of bounds for type 'char [2049]' in packet-quakeworld.c:134:5 Product: Wireshark Version: Git Hardware:

[Wireshark-bugs] [Bug 13641] New: [oss-fuzz] UBSAN: shift exponent 32 is too large for 32-bit type 'int' in packet-sigcomp.c:3857:24

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13641 Bug ID: 13641 Summary: [oss-fuzz] UBSAN: shift exponent 32 is too large for 32-bit type 'int' in packet-sigcomp.c:3857:24 Product: Wireshark Version: Git Hardware:

[Wireshark-bugs] [Bug 13641] [oss-fuzz] UBSAN: shift exponent 32 is too large for 32-bit type 'int' in packet-sigcomp.c:3857:24

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13641 --- Comment #1 from Peter Wu --- Created attachment 15489 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=15489=edit Packet capture file -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13642] [oss-fuzz] ASAN: heap-buffer-overflow (run/tshark+0x100447) in __interceptor_strncmp.part.74

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13642 Peter Wu changed: What|Removed |Added Status|CONFIRMED |RESOLVED

[Wireshark-bugs] [Bug 13609] [oss-fuzz] ASAN: heap-buffer-overflow (run/tshark+0xf751e) in __interceptor_strncmp.part.68

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13609 --- Comment #3 from Peter Wu --- *** Bug 13642 has been marked as a duplicate of this bug. *** -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13642] [oss-fuzz] ASAN: heap-buffer-overflow (run/tshark+0x100447) in __interceptor_strncmp.part.74

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13642 Peter Wu changed: What|Removed |Added URL|https://bugs.chromium.org/p

[Wireshark-bugs] [Bug 13643] [oss-fuzz] ASAN: heap-buffer-overflow epan/dissectors/packet-dof.c:3899:32 in OALMarshal_UncompressValue

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13643 Peter Wu changed: What|Removed |Added Status|CONFIRMED |RESOLVED

[Wireshark-bugs] [Bug 13643] [oss-fuzz] ASAN: heap-buffer-overflow epan/dissectors/packet-dof.c:3899:32 in OALMarshal_UncompressValue

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13643 --- Comment #1 from Peter Wu --- Created attachment 15491 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=15491=edit Packet capture file -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13624] [oss-fuzz] UBSAN: index 2049 out of bounds for type 'char [2049]' in packet-quakeworld.c:134:5

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13624 Michael Mann changed: What|Removed |Added Resolution|--- |FIXED

[Wireshark-bugs] [Bug 13624] [oss-fuzz] UBSAN: index 2049 out of bounds for type 'char [2049]' in packet-quakeworld.c:134:5

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13624 --- Comment #3 from Gerrit Code Review --- Change 21235 merged by Michael Mann: packet-quakeworld.c: Fix potential out of bounds error. https://code.wireshark.org/review/21235 -- You are receiving

[Wireshark-bugs] [Bug 13624] [oss-fuzz] UBSAN: index 2049 out of bounds for type 'char [2049]' in packet-quakeworld.c:134:5

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13624 --- Comment #4 from Gerrit Code Review --- Change 21285 had a related patch set uploaded by Michael Mann: packet-quakeworld.c: Fix potential out of bounds error. https://code.wireshark.org/review/21285

[Wireshark-bugs] [Bug 13624] [oss-fuzz] UBSAN: index 2049 out of bounds for type 'char [2049]' in packet-quakeworld.c:134:5

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13624 --- Comment #5 from Gerrit Code Review --- Change 21286 had a related patch set uploaded by Michael Mann: packet-quakeworld.c: Fix potential out of bounds error. https://code.wireshark.org/review/21286

[Wireshark-bugs] [Bug 13644] [oss-fuzz] UBSAN: index 2049 out of bounds for type 'char [2049]' in packet-quakeworld.c:134:5

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13644 Peter Wu changed: What|Removed |Added Resolution|--- |DUPLICATE

[Wireshark-bugs] [Bug 13624] [oss-fuzz] UBSAN: index 2049 out of bounds for type 'char [2049]' in packet-quakeworld.c:134:5

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13624 --- Comment #6 from Peter Wu --- *** Bug 13644 has been marked as a duplicate of this bug. *** -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13645] [oss-fuzz] ASAN: stack-overflow (run/tshark+0x187170) in malloc

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13645 --- Comment #1 from Peter Wu --- Created attachment 15493 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=15493=edit Packet capture file -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13645] New: [oss-fuzz] ASAN: stack-overflow (run/tshark+0x187170) in malloc

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13645 Bug ID: 13645 Summary: [oss-fuzz] ASAN: stack-overflow (run/tshark+0x187170) in malloc Product: Wireshark Version: Git Hardware: x86-64 URL:

[Wireshark-bugs] [Bug 13645] [oss-fuzz] ASAN: stack-overflow (run/tshark+0x187170) in malloc

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13645 Peter Wu changed: What|Removed |Added Resolution|--- |DUPLICATE

[Wireshark-bugs] [Bug 13612] [oss-fuzz] ASAN: stack-overflow (run/tshark+0x1a12de) in __sanitizer::StackDepotPut(__sanitizer::StackTrace)

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13612 --- Comment #2 from Peter Wu --- *** Bug 13645 has been marked as a duplicate of this bug. *** -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13608] [oss-fuzz] ASAN: heap-buffer-overflow epan/dissectors/packet-dof.c:3899:32 in OALMarshal_UncompressValue

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13608 Michael Mann changed: What|Removed |Added OS|Linux (other) |All

[Wireshark-bugs] [Bug 13608] [oss-fuzz] ASAN: heap-buffer-overflow epan/dissectors/packet-dof.c:3899:32 in OALMarshal_UncompressValue

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13608 --- Comment #6 from Gerrit Code Review --- Change 21290 had a related patch set uploaded by Michael Mann: DOF: Fix buffer overflow (read) https://code.wireshark.org/review/21290 -- You are receiving

[Wireshark-bugs] [Bug 13608] [oss-fuzz] ASAN: heap-buffer-overflow epan/dissectors/packet-dof.c:3899:32 in OALMarshal_UncompressValue

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13608 --- Comment #5 from Gerrit Code Review --- Change 21287 merged by Michael Mann: DOF: Fix buffer overflow (read) https://code.wireshark.org/review/21287 -- You are receiving this mail because: You are

[Wireshark-bugs] [Bug 13624] [oss-fuzz] UBSAN: index 2049 out of bounds for type 'char [2049]' in packet-quakeworld.c:134:5

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13624 --- Comment #8 from Gerrit Code Review --- Change 21285 merged by Michael Mann: packet-quakeworld.c: Fix potential out of bounds error. https://code.wireshark.org/review/21285 -- You are receiving

[Wireshark-bugs] [Bug 13608] [oss-fuzz] ASAN: heap-buffer-overflow epan/dissectors/packet-dof.c:3899:32 in OALMarshal_UncompressValue

2017-04-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13608 --- Comment #7 from Gerrit Code Review --- Change 21290 merged by Michael Mann: DOF: Fix buffer overflow (read) https://code.wireshark.org/review/21290 -- You are receiving this mail because: You are