We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
A SEGV signal occurred when running mp4compact.
ASAN:SIGSEGV ================================================================= ==10159==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000028 (pc 0x000000492d54 bp 0x7ffdea267cf0 sp 0x7ffdea267970 T0) #0 0x492d53 in AP4_Processor::ProcessFragments(AP4_MoovAtom*, AP4_List<AP4_AtomLocator>&, AP4_ContainerAtom*, AP4_SidxAtom*, unsigned long long, AP4_ByteStream&, AP4_ByteStream&) /home/swt_fuzz/Bento4/Source/C++/Core/Ap4Processor.cpp:229 #1 0x4a3c22 in AP4_Processor::Process(AP4_ByteStream&, AP4_ByteStream&, AP4_ByteStream*, AP4_Processor::ProgressListener*, AP4_AtomFactory&) /home/swt_fuzz/Bento4/Source/C++/Core/Ap4Processor.cpp:711 #2 0x43e1e3 in main /home/swt_fuzz/Bento4/Source/C++/Apps/Mp4Compact/Mp4Compact.cpp:220 #3 0x7f9c8ddf782f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #4 0x4417e8 in _start (/home/swt_fuzz/Bento4/cmakebuild/mp4compact+0x4417e8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/swt_fuzz/Bento4/Source/C++/Core/Ap4Processor.cpp:229 AP4_Processor::ProcessFragments(AP4_MoovAtom*, AP4_List<AP4_AtomLocator>&, AP4_ContainerAtom*, AP4_SidxAtom*, unsigned long long, AP4_ByteStream&, AP4_ByteStream&) ==10159==ABORTING
The testing program is mp4compact. And the input file has been put at: https://github.com/fCorleone/fuzz_programs/blob/master/Bento4/test13
The text was updated successfully, but these errors were encountered:
@swtkiwi Reproducer is not available via that link. Can you attach it as a ZIP file to this issue, thanks.
Someone requested a CVE for this, which got assigned CVE-2018-14590.
Sorry, something went wrong.
The test case is at https://github.com/fCorleone/fuzz_programs/blob/master/Bento4/test13.dms?raw=true
barbibulle
No branches or pull requests
A SEGV signal occurred when running mp4compact.
The testing program is mp4compact.
And the input file has been put at:
https://github.com/fCorleone/fuzz_programs/blob/master/Bento4/test13
The text was updated successfully, but these errors were encountered: