Wireshark-bugs: [Wireshark-bugs] [Bug 12344] Buildbot crash output: fuzz-2016-04-16-19092.pcap

Date: Sat, 16 Apr 2016 20:02:53 +0000

Comment # 1 on bug 12344 from
Crashes in Wireshark 2.1.0 (v2.1.0rc0-2701-geab6386 from master) with

0   libwireshark.0.dylib              0x0000000102a5ea0c dissect_http_message +
364 (packet-http.c:833)
1   libwireshark.0.dylib              0x0000000102a5d828 dissect_http + 808
(packet-http.c:3067)
2   libwireshark.0.dylib              0x000000010267eb9b call_dissector_work +
235 (packet.c:656)
3   libwireshark.0.dylib              0x000000010267ea75 dissector_try_uint_new
+ 101 (packet.c:1191)
4   libwireshark.0.dylib              0x0000000102d925c2 dissect_payload + 194
(packet-sctp.c:2509)
5   libwireshark.0.dylib              0x0000000102d91377 dissect_data_chunk +
3175 (packet-sctp.c:3426)
6   libwireshark.0.dylib              0x0000000102d8f1c9 dissect_sctp_chunk +
1769 (packet-sctp.c:4381)
7   libwireshark.0.dylib              0x0000000102d8e88d dissect_sctp_packet +
3597 (packet-sctp.c:4539)
8   libwireshark.0.dylib              0x0000000102d8d823 dissect_sctp + 387
(packet-sctp.c:4764)
9   libwireshark.0.dylib              0x000000010267eb9b call_dissector_work +
235 (packet.c:656)
10  libwireshark.0.dylib              0x000000010267ea75 dissector_try_uint_new
+ 101 (packet.c:1191)
11  libwireshark.0.dylib              0x0000000102ab8550 ip_try_dissect + 128
(packet-ip.c:1977)
12  libwireshark.0.dylib              0x0000000102aba529 dissect_ip_v4 + 5833
(packet-ip.c:2476)
13  libwireshark.0.dylib              0x000000010267eb9b call_dissector_work +
235 (packet.c:656)
14  libwireshark.0.dylib              0x000000010267ec83 dissector_try_uint +
99 (packet.c:1191)
15  libwireshark.0.dylib              0x0000000102975cf6 dissect_ethertype +
326 (packet-ethertype.c:257)
16  libwireshark.0.dylib              0x000000010267eb9b call_dissector_work +
235 (packet.c:656)
17  libwireshark.0.dylib              0x000000010267e0c2
call_dissector_with_data + 50 (packet.c:2774)
18  libwireshark.0.dylib              0x00000001029755a1 dissect_eth_common +
3041 (packet-eth.c:540)
19  libwireshark.0.dylib              0x00000001029749a0 dissect_eth + 256
(packet-eth.c:838)
20  libwireshark.0.dylib              0x000000010267eb9b call_dissector_work +
235 (packet.c:656)
21  libwireshark.0.dylib              0x000000010267ea75 dissector_try_uint_new
+ 101 (packet.c:1191)
22  libwireshark.0.dylib              0x00000001029a3c60 dissect_frame + 3280
(packet-frame.c:492)
23  libwireshark.0.dylib              0x000000010267eb9b call_dissector_work +
235 (packet.c:656)
24  libwireshark.0.dylib              0x000000010267e0c2
call_dissector_with_data + 50 (packet.c:2774)
25  libwireshark.0.dylib              0x000000010267df9d dissect_record + 589
(packet.c:541)
26  libwireshark.0.dylib              0x0000000102672674
epan_dissect_run_with_taps + 68 (epan.c:377)
27  wireshark                         0x0000000101cff531
add_packet_to_packet_list + 257 (file.c:1126)
28  wireshark                         0x0000000101cf99cf read_packet + 447
(file.c:1214)
29  wireshark                         0x0000000101cf946d cf_read + 1373
(file.c:597)
30  wireshark                         0x0000000101e7c553
MainWindow::openCaptureFile(QString, QString, unsigned int) + 1555
(main_window_slots.cpp:228)
31  wireshark                         0x0000000101d023a3 main + 5427
(wireshark-qt.cpp:1360)
32  libdyld.dylib                     0x00007fff8b2e35ad start + 1

That's the last line of

        gboolean try_desegment_body = (http_desegment_body &&
            (!(conv_data->request_method &&
g_str_equal(conv_data->request_method, "HEAD"))) &&
            ((tcpinfo == NULL) || (!IS_TH_FIN(tcpinfo->flags))));

tcpinfo isn't null, but it is bogus.


You are receiving this mail because:
  • You are watching all bug changes.