Wireshark-bugs: [Wireshark-bugs] [Bug 7803] Invalid memory accesses when loading radius captures
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7803
--- Comment #1 from Evan Huus <eapache@xxxxxxxxx> 2012-10-06 13:15:11 PDT ---
The previous valgrind output was confusing because of some optimization - this
looks saner:
==10272== Invalid read of size 1
==10272== at 0x4C2C831: strcmp (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10272== by 0x9DDA348: g_str_equal (ghash.c:1704)
==10272== by 0x9DD951F: g_hash_table_insert_internal (ghash.c:422)
==10272== by 0x608EF1F: add_attribute (radius_dict.l:386)
==10272== by 0x608CE4C: Radiuslex (radius_dict.l:231)
==10272== by 0x608F842: radius_load_dictionary (radius_dict.l:596)
==10272== by 0x6716EF6: register_radius_fields (packet-radius.c:2016)
==10272== by 0x60490CE: proto_registrar_get_byname (proto.c:802)
==10272== by 0x671544E: dissect_radius (packet-radius.c:1401)
==10272== by 0x603CB2E: call_dissector_through_handle (packet.c:413)
==10272== by 0x603CD2A: call_dissector_work (packet.c:508)
==10272== by 0x603D886: dissector_try_uint_new (packet.c:928)
==10272== Address 0x10917430 is 0 bytes inside a block of size 19 free'd
==10272== at 0x4C2A739: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10272== by 0x608EECF: add_attribute (radius_dict.l:382)
==10272== by 0x608CE4C: Radiuslex (radius_dict.l:231)
==10272== by 0x608F842: radius_load_dictionary (radius_dict.l:596)
==10272== by 0x6716EF6: register_radius_fields (packet-radius.c:2016)
==10272== by 0x60490CE: proto_registrar_get_byname (proto.c:802)
==10272== by 0x671544E: dissect_radius (packet-radius.c:1401)
==10272== by 0x603CB2E: call_dissector_through_handle (packet.c:413)
==10272== by 0x603CD2A: call_dissector_work (packet.c:508)
==10272== by 0x603D886: dissector_try_uint_new (packet.c:928)
==10272== by 0x603D8F0: dissector_try_uint (packet.c:954)
==10272== by 0x68F29DB: decode_udp_ports (packet-udp.c:271)
==10272==
==10272== Invalid read of size 1
==10272== at 0x4C2C848: strcmp (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10272== by 0x9DDA348: g_str_equal (ghash.c:1704)
==10272== by 0x9DD951F: g_hash_table_insert_internal (ghash.c:422)
==10272== by 0x608EF1F: add_attribute (radius_dict.l:386)
==10272== by 0x608CE4C: Radiuslex (radius_dict.l:231)
==10272== by 0x608F842: radius_load_dictionary (radius_dict.l:596)
==10272== by 0x6716EF6: register_radius_fields (packet-radius.c:2016)
==10272== by 0x60490CE: proto_registrar_get_byname (proto.c:802)
==10272== by 0x671544E: dissect_radius (packet-radius.c:1401)
==10272== by 0x603CB2E: call_dissector_through_handle (packet.c:413)
==10272== by 0x603CD2A: call_dissector_work (packet.c:508)
==10272== by 0x603D886: dissector_try_uint_new (packet.c:928)
==10272== Address 0x10917431 is 1 bytes inside a block of size 19 free'd
==10272== at 0x4C2A739: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10272== by 0x608EECF: add_attribute (radius_dict.l:382)
==10272== by 0x608CE4C: Radiuslex (radius_dict.l:231)
==10272== by 0x608F842: radius_load_dictionary (radius_dict.l:596)
==10272== by 0x6716EF6: register_radius_fields (packet-radius.c:2016)
==10272== by 0x60490CE: proto_registrar_get_byname (proto.c:802)
==10272== by 0x671544E: dissect_radius (packet-radius.c:1401)
==10272== by 0x603CB2E: call_dissector_through_handle (packet.c:413)
==10272== by 0x603CD2A: call_dissector_work (packet.c:508)
==10272== by 0x603D886: dissector_try_uint_new (packet.c:928)
==10272== by 0x603D8F0: dissector_try_uint (packet.c:954)
==10272== by 0x68F29DB: decode_udp_ports (packet-udp.c:271)
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.