http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1416
stephentfisher@xxxxxxxxx changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |FIXED
------- Comment #9 from stephentfisher@xxxxxxxxx 2007-05-26 00:46 GMT -------
I was able to reproduce the stack smashing crash after compiling Wireshark with
-fstack-protector-all on my Linux machine. I have fixed the source of the
problem in SVN revision 21947
(http://anonsvn.wireshark.org/viewvc/viewvc.cgi?view=rev&revision=21947).
My backtrace actually showed dissect_docsis_cm_cap() as the last function
before the stack smashing check code executed instead of bootp_option()
(although bootp_option() calls dissect_docsis_cm_cap()), so please confirm for
me that this fixes the problem you're experiencing.
Your SuSE system must have -fstack-protector / -fstack-protector-all enabled by
default in gcc. More information about this implementation can be found at
http://www.trl.ibm.com/projects/security/ssp/node4.html for those who are
curious.
Again, thanks for your bug report!
--
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.