Bug ID |
12430
|
Summary |
Tshark crashes when analyzing rtp due to pointer being freed not allocated
|
Product |
Wireshark
|
Version |
2.0.3
|
Hardware |
x86
|
OS |
Mac OS X 10.10
|
Status |
UNCONFIRMED
|
Severity |
Major
|
Priority |
Low
|
Component |
TShark
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Build Information:
TShark (Wireshark) 2.0.3 (v2.0.3-0-geed34f0 from master-2.0)
Copyright 1998-2016 Gerald Combs <[email protected]> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with libpcap, without POSIX capabilities, with libz 1.2.5,
with GLib 2.36.0, with SMI 0.4.8, with c-ares 1.10.0, with Lua 5.2, with GnuTLS
2.12.19, with Gcrypt 1.5.0, with MIT Kerberos, with GeoIP.
Running on Mac OS X 10.10.5, build 14F27 (Darwin 14.5.0), with locale
en_US.UTF-8, with libpcap version 1.5.3 - Apple version 47, with libz 1.2.5,
with GnuTLS 2.12.19, with Gcrypt 1.5.0.
Intel(R) Core(TM) i5-4570 CPU @ 3.20GHz (with SSE4.2)
Built using llvm-gcc 4.2.1 (Based on Apple Inc. build 5658) (LLVM build
2336.9.00).
--
This issue does not occur on v1.12.11-0-gc74c83c from master-1.12.
On 2.0.3 we see the following (tshark crash after 1 stream gets analyzed).
Tried on both OSX 10.10.5 and 10.9.4
➜ /tmp tshark -r airportSniffeNm8ap.cap -d udp.port==19594,rtp -q -z
rtp,streams
========================= RTP Streams ========================
Src IP addr Port Dest IP addr Port SSRC Payload Pkts
Lost Max Delta(ms) Max Jitter(ms) Mean Jitter(ms) Problems?
10.0.10.201 19594 10.0.10.241 19888 0xE417259E ITU-T G.711 PCMU 608
-84 (-16.0%) 1015.20 4825098.23 131079.30 X
tshark(53115,0x7fff7cb35300) malloc: *** error for object 0x7fc912a76b60:
pointer being freed was not allocated
*** set a breakpoint in malloc_error_break to debug
[1] 53115 abort tshark -r airportSniffeNm8ap.cap -d udp.port==19594,rtp
-q -z rtp,streams
Expected output as seen on 1.12.11 is as follows:
➜ /tmp tshark -r airportSniffeNm8ap.cap -d udp.port==19594,rtp -q -z
rtp,streams
========================= RTP Streams ========================
Src IP addr Port Dest IP addr Port SSRC Payload Pkts
Lost Max Delta(ms) Max Jitter(ms) Mean Jitter(ms) Problems?
10.0.10.201 19594 10.0.10.241 19888 0xE417259E ITU-T G.711 PCMU 608
-83 (-15.8%) 1015.20 4825098.23 131295.25 X
10.0.10.241 19888 10.0.10.201 19594 0x5767C015 ITU-T G.711 PCMU 974
-10 (-1.0%) 375.14 45.01 8.23 X
10.0.10.201 19594 10.0.10.241 19888 0xF1E49EE0 ITU-T G.711 PCMU 1
0 (0.0%) 0.00 0.00 0.00
10.0.10.241 19888 10.0.10.201 19594 0x576700F9 ITU-T G.711 PCMU 1
0 (0.0%) 0.00 0.00 0.00
10.0.10.241 19888 10.0.10.201 19594 0x6560C015 ITU-T G.711 PCMU 1
0 (0.0%) 0.00 0.00 0.00
10.0.10.241 19888 10.0.10.201 19594 0xD319C015 ITU-T G.711 PCMU 1
0 (0.0%) 0.00 0.00 0.00
10.0.10.241 19888 10.0.10.201 19594 0x5167C015 ITU-T G.711 PCMU 1
0 (0.0%) 0.00 0.00 0.00
==============================================================
You are receiving this mail because:
- You are watching all bug changes.