Wireshark-bugs: [Wireshark-bugs] [Bug 10115] Dissector bug in JSON protocol
Date: Sun, 18 May 2014 19:18:10 +0000
Alexis La Goutte changed bug 10115
What | Removed | Added |
---|---|---|
Status | UNCONFIRMED | CONFIRMED |
CC | [email protected] | |
Ever confirmed | 1 |
Comment # 1
on bug 10115
from Alexis La Goutte
the backtrace #0 0x00007ffff0811f77 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 #1 0x00007ffff08155e8 in __GI_abort () at abort.c:90 #2 0x00007ffff1027fdd in ?? () from /lib/x86_64-linux-gnu/libglib-2.0.so.0 #3 0x00007ffff10453b7 in g_assertion_message () from /lib/x86_64-linux-gnu/libglib-2.0.so.0 #4 0x00007ffff104541a in g_assertion_message_expr () from /lib/x86_64-linux-gnu/libglib-2.0.so.0 #5 0x00007ffff537f819 in wmem_block_fast_alloc (private_data=<optimized out>, size=3145717) at wmem_allocator_block_fast.c:97 #6 0x00007ffff4c68180 in json_string_unescape (tok=0x7fffbfdda6c0) at packet-json.c:277 #7 after_value (tvbparse_data=<optimized out>, wanted_data=<optimized out>, tok=0x7fffbfdda6c0) at packet-json.c:414 #8 0x00007ffff48b47ca in execute_callbacks (curr=0x7fffbfdda6c0, tt=0x7fffbfdda0a0) at tvbparse.c:1280 #9 0x00007ffff48b518e in tvbparse_get (tt=tt@entry=0x7fffbfdda0a0, wanted=<optimized out>) at tvbparse.c:1341 #10 0x00007ffff4c67dff in dissect_json (tvb=0x1b98800, pinfo=0x7fffffffdac8, tree=0x0, data="" out>) at packet-json.c:158 #11 0x00007ffff4886e4f in call_dissector_through_handle (handle=handle@entry=0x133c4b0, tvb=tvb@entry=0x1b98800, pinfo=pinfo@entry=0x7fffffffdac8, tree=tree@entry=0x0, data="" at packet.c:592 #12 0x00007ffff4887725 in call_dissector_work (handle=0x133c4b0, tvb=0x1b98800, pinfo_arg=0x7fffffffdac8, tree=0x0, add_proto_name=1, data="" at packet.c:683 #13 0x00007ffff4bd4c29 in dissect_http_message (tvb=tvb@entry=0x1b7e770, offset=<optimized out>, offset@entry=0, pinfo=pinfo@entry=0x7fffffffdac8, tree=tree@entry=0x0, conv_data=conv_data@entry=0x7fffbd7d46d0) at packet-http.c:1450 #14 0x00007ffff4bd5d09 in dissect_http (tvb=0x1b7e770, pinfo=0x7fffffffdac8, tree=0x0, data="" out>) at packet-http.c:2777 #15 0x00007ffff4886e4f in call_dissector_through_handle (handle=handle@entry=0x130ec90, tvb=tvb@entry=0x1b7e770, pinfo=pinfo@entry=0x7fffffffdac8, tree=tree@entry=0x0, data="" at packet.c:592 #16 0x00007ffff4887725 in call_dissector_work (handle=0x130ec90, tvb=0x1b7e770, pinfo_arg=0x7fffffffdac8, tree=0x0, add_proto_name=1, data="" at packet.c:683 #17 0x00007ffff487a6e7 in try_conversation_dissector (addr_a=addr_a@entry=0x7fffffffdb58, addr_b=addr_b@entry=0x7fffffffdb70, ptype=ptype@entry=PT_TCP, port_a=port_a@entry=80, port_b=port_b@entry=49974, tvb=tvb@entry=0x1b7e770, pinfo=pinfo@entry=0x7fffffffdac8, tree=tree@entry=0x0, data="" at conversation.c:1307 #18 0x00007ffff4f526ab in decode_tcp_ports (tvb=tvb@entry=0x1b7e590, offset=<optimized out>, pinfo=pinfo@entry=0x7fffffffdac8, tree=tree@entry=0x0, src_port=src_port@entry=80, dst_port=dst_port@entry=49974, tcpd=tcpd@entry=0x7fffbd7d4030, tcpinfo=tcpinfo@entry=0x7fffffffca40) at packet-tcp.c:3875 #19 0x00007ffff4f52c4f in process_tcp_payload (tvb=tvb@entry=0x1b7e590, offset=offset@entry=0, pinfo=pinfo@entry=0x7fffffffdac8, tree=tree@entry=0x0, tcp_tree=tcp_tree@entry=0x0, src_port=src_port@entry=80, dst_port=dst_port@entry=49974, seq=seq@entry=0, nxtseq=nxtseq@entry=0, is_tcp_segment=is_tcp_segment@entry=0, tcpd=tcpd@entry=0x7fffbd7d4030, tcpinfo=tcpinfo@entry=0x7fffffffca40) at packet-tcp.c:3991 #20 0x00007ffff4f53440 in desegment_tcp (tcpinfo=0x7fffffffca40, tcpd=0x7fffbd7d4030, tcp_tree=0x0, tree=0x0, dport=49974, sport=80, nxtseq=3146035, seq=3145057, offset=32, pinfo=0x7fffffffdac8, tvb=0x1b7e6d0) at packet-tcp.c:1868 #21 dissect_tcp_payload (tvb=tvb@entry=0x1b7e6d0, pinfo=pinfo@entry=0x7fffffffdac8, offset=offset@entry=32, seq=<optimized out>, nxtseq=nxtseq@entry=3146035, sport=80, dport=49974, tree=tree@entry=0x0, tcp_tree=tcp_tree@entry=0x0, tcpd=tcpd@entry=0x7fffbd7d4030, tcpinfo=tcpinfo@entry=0x7fffffffca40) at packet-tcp.c:4058 #22 0x00007ffff4f54e37 in dissect_tcp (tvb=<optimized out>, pinfo=0x7fffffffdac8, tree=0x0) at packet-tcp.c:4866
You are receiving this mail because:
- You are watching all bug changes.
- References:
- [Wireshark-bugs] [Bug 10115] New: Dissector bug in JSON protocol
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 10115] New: Dissector bug in JSON protocol
- Prev by Date: [Wireshark-bugs] [Bug 10116] Qtshark crashes with seg fault 11 if the I/O Graph window is closed before background processing has completed
- Next by Date: [Wireshark-bugs] [Bug 10115] Dissector bug in JSON protocol
- Previous by thread: [Wireshark-bugs] [Bug 10115] New: Dissector bug in JSON protocol
- Next by thread: [Wireshark-bugs] [Bug 10115] Dissector bug in JSON protocol
- Index(es):