Wireshark-bugs: [Wireshark-bugs] [Bug 8742] NetMon Overly Big Frame Table Crash
Date: Sun, 02 Jun 2013 13:22:05 +0000
What | Removed | Added |
---|---|---|
Severity | Minor | Critical |
Comment # 5
on bug 8742
from G. Geshev
TShark 1.11.0 (SVN Rev 49680 from /trunk) Copyright 1998-2013 Gerald Combs <gerald@wireshark.org> and contributors. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Compiled (64-bit) with GLib 2.32.3, with libpcap, with libz 1.2.3.4, with POSIX capabilities (Linux), without libnl, with SMI 0.4.8, with c-ares 1.7.5, with Lua 5.1, without Python, with GnuTLS 2.12.14, with Gcrypt 1.5.0, with MIT Kerberos, with GeoIP. Running on Linux 3.5.0-32-generic, with locale en_US.UTF-8, with libpcap version 1.1.1, with libz 1.2.3.4. Intel(R) Core(TM) i7-3610QM CPU @ 2.30GHz Built using gcc 4.6.3. -- $ gdb -q -ex 'r -n -r 7c51012f016f3e7d168fbf194fa1e932.cap' /usr/local/bin/tshark Reading symbols from /usr/local/bin/tshark...done. Starting program: /usr/local/bin/tshark -n -r 7c51012f016f3e7d168fbf194fa1e932.cap [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Program received signal SIGSEGV, Segmentation fault. __GI___libc_free (mem=0x616873657269772f) at malloc.c:2970 2970 malloc.c: No such file or directory. (gdb) bt #0 __GI___libc_free (mem=0x616873657269772f) at malloc.c:2970 #1 0x00007ffff7b4179c in netmon_sequential_close (wth=0x179dc00) at netmon.c:935 #2 0x00007ffff7b6a623 in wtap_sequential_close (wth=0x179dc00) at wtap.c:746 #3 0x00007ffff7b6a701 in wtap_close (wth=0x179dc00) at wtap.c:788 #4 0x00007ffff7b31a77 in wtap_open_offline (filename=0x179a800 "7c51012f016f3e7d168fbf194fa1e932.cap", err=0x7fffffffe100, err_info=0x7fffffffd690, do_random=0) at file_access.c:386 #5 0x000000000041ea7e in cf_open (cf=0x653ce0, fname=0x179a800 "7c51012f016f3e7d168fbf194fa1e932.cap", is_tempfile=0, err=0x7fffffffe100) at tshark.c:3699 #6 0x000000000041b707 in main (argc=4, argv=0x7fffffffe238) at tshark.c:1885 (gdb) up #1 0x00007ffff7b4179c in netmon_sequential_close (wth=0x179dc00) at netmon.c:935 935 g_free(netmon->frame_table); (gdb) li 930 netmon_sequential_close(wtap *wth) 931 { 932 netmon_t *netmon = (netmon_t *)wth->priv; 933 934 if (netmon->frame_table != NULL) { 935 g_free(netmon->frame_table); 936 netmon->frame_table = NULL; 937 } 938 } 939 (gdb)
You are receiving this mail because:
- You are watching all bug changes.
- Prev by Date: [Wireshark-bugs] [Bug 8730] GSM_CBCH dissector hangs
- Next by Date: [Wireshark-bugs] [Bug 8750] New: Faulty Memory Allocation at pcapng_read_interface_statistics_block()
- Previous by thread: [Wireshark-bugs] [Bug 8730] GSM_CBCH dissector hangs
- Next by thread: [Wireshark-bugs] [Bug 8742] NetMon Overly Big Frame Table Crash
- Index(es):