https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5709
Summary: AgentX dissector emits a bug warning
Product: Wireshark
Version: SVN
Platform: All
OS/Version: All
Status: NEW
Severity: Minor
Priority: Low
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: fulko.hew@xxxxxxxxx
Created an attachment (id=5962)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=5962)
patch to prevent warning message
Build Information:
Version 1.5.0 (SVN Rev 35476 from /trunk)
Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GTK+ 2.12.8, with GLib 2.14.6, with libpcap 1.1.1, with
libz 1.2.3, with POSIX capabilities (Linux), without libpcre, with SMI 0.4.8,
without c-ares, without ADNS, without Lua, without Python, with GnuTLS 1.6.3,
with Gcrypt 1.2.4, with MIT Kerberos, without GeoIP, without PortAudio, without
AirPcap.
Running on Linux 2.6.26.8-57.fc8, with libpcap version 1.1.1, with libz 1.2.3,
GnuTLS 1.6.3, Gcrypt 1.2.4.
Built using gcc 4.1.2 20070925 (Red Hat 4.1.2-33).
--
When Wireshark receives an AgentX Ping-PDU that contains a zero length
'context' identifier it emits the following warning:
14:30:20 Warn Dissector bug, protocol AgentX, in packet 1066:
tvbuff.c:2571: failed assertion "bufsize != 0"
The attached patch prevents the warning message from appearing under that
circumstance. Note: This patch will also prevent the warning under all other
conditions where a zero length string is specified anywhere in the protocol
dissector.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.