steps to reproduce:
1) compile latest release of sleuthkit (with debugging symbols)
2) create an ext3 partition (I tested on loop and on a vmware virtual disk)
3) run jcat against the image with an argument of a number greater than 0
result:
usenixatc:~/newtsk# gdb ./sleuthkit-3.2.0/tools/fstools/jcat
(gdb) r /dev/loop0 2
Starting program: /root/newtsk/sleuthkit-3.2.0/tools/fstools/jcat /dev/loop0 2
[Thread debugging using libthread_db enabled]
[New Thread 0xb74b06c0 (LWP 8221)]
Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 0xb74b06c0 (LWP 8221)]
0x080abb6e in ext2fs_jblk_walk (fs=0x9161828, start=2, end=2, flags=0, action=0, ptr=0x0) at ext2fs_journal.c:521
521 if (big_tsk_getu32(head->magic) != EXT2_JMAGIC)
Current language: auto; currently c
(gdb) x/x head
0x9160d08: Cannot access memory at address 0x9160d08
not really sure what other info to give. it should be reproducible by just creating an ext3 image on a file made from /dev/zero. I can send other info as needed to fix the bug.
View and moderate all "bugs Discussion" comments posted by this user
Mark all as spam, and block user from posting to "Bugs"
more info I forgot to include:
running the latest debian, 32 bit, with gcc 4.3.2 (distro package)