Wireshark-bugs: [Wireshark-bugs] [Bug 8825] tshark.c crash

Date: Mon, 24 Jun 2013 23:05:46 +0000

Comment # 5 on bug 8825 from
==20618== Invalid read of size 1
==20618==    at 0x40DD58: print_hex_data_buffer (print.c:1005)
==20618==    by 0x40FAB8: print_hex_data (print.c:922)
==20618==    by 0x417442: print_packet (tshark.c:3665)
==20618==    by 0x4189F7: process_packet (tshark.c:3270)
==20618==    by 0x40B66A: main (tshark.c:3048)
==20618==  Address 0x131fa870 is 0 bytes inside a block of size 131,117 free'd
==20618==    at 0x4C2B60C: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==20618==    by 0x640828D: fragment_add_work.isra.4 (reassemble.c:1176)
==20618==    by 0x640849B: fragment_add_common (reassemble.c:1360)
==20618==    by 0x6408AF7: fragment_add (reassemble.c:1380)
==20618==    by 0x6A30F19: dissect_tcp_payload (packet-tcp.c:1828)
==20618==    by 0x6A32AA9: dissect_tcp (packet-tcp.c:4889)
==20618==    by 0x63EA153: call_dissector_through_handle (packet.c:458)
==20618==    by 0x63EA80F: call_dissector_work (packet.c:552)
==20618==    by 0x63EB01B: dissector_try_uint_new (packet.c:969)
==20618==    by 0x63EB076: dissector_try_uint (packet.c:995)
==20618==    by 0x6768E35: dissect_ip (packet-ip.c:2413)
==20618==    by 0x63EA153: call_dissector_through_handle (packet.c:458)


You are receiving this mail because:
  • You are watching all bug changes.