Comment # 14
on bug 2630
from Tirian Wilson
Created attachment 11765 [details]
Here is an example capture file, and gdb backtrace
Here is another example of the problem - it was reproduced using the latest
1.10.2 wireshark on CentOS 6.4. The steps to reproduce the problem are: open
the included .pcap file, go to "Telephony", "RTP", "Show all streams". When
the window pops up, select the stream with a source IP of "67.221.121.114" and
click the "Find Reverse" button. This should highlight the 27,065 packet
stream as well. Then click the "Analyze" button and wait for it to complete.
When it has completed, click the "Player" button and then click "Decode"
button. Wireshark will then process the operation and promptly crash when it
tries to display the result.
You are receiving this mail because:
- You are the assignee for the bug.
- You are watching all bug changes.