Wireshark-bugs: [Wireshark-bugs] [Bug 8742] NetMon Overly Big Frame Table Crash
Date: Sun, 02 Jun 2013 13:22:05 +0000

changed bug 8742

What Removed Added
Severity Minor Critical

Comment # 5 on bug 8742 from
TShark 1.11.0 (SVN Rev 49680 from /trunk)

Copyright 1998-2013 Gerald Combs <gerald@wireshark.org> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GLib 2.32.3, with libpcap, with libz 1.2.3.4, with POSIX
capabilities (Linux), without libnl, with SMI 0.4.8, with c-ares 1.7.5, with
Lua
5.1, without Python, with GnuTLS 2.12.14, with Gcrypt 1.5.0, with MIT Kerberos,
with GeoIP.

Running on Linux 3.5.0-32-generic, with locale en_US.UTF-8, with libpcap
version
1.1.1, with libz 1.2.3.4.
      Intel(R) Core(TM) i7-3610QM CPU @ 2.30GHz

Built using gcc 4.6.3.

--
$ gdb -q -ex 'r -n -r 7c51012f016f3e7d168fbf194fa1e932.cap'
/usr/local/bin/tshark
Reading symbols from /usr/local/bin/tshark...done.
Starting program: /usr/local/bin/tshark -n -r
7c51012f016f3e7d168fbf194fa1e932.cap
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".

Program received signal SIGSEGV, Segmentation fault.
__GI___libc_free (mem=0x616873657269772f) at malloc.c:2970
2970    malloc.c: No such file or directory.
(gdb) bt
#0  __GI___libc_free (mem=0x616873657269772f) at malloc.c:2970
#1  0x00007ffff7b4179c in netmon_sequential_close (wth=0x179dc00) at
netmon.c:935
#2  0x00007ffff7b6a623 in wtap_sequential_close (wth=0x179dc00) at wtap.c:746
#3  0x00007ffff7b6a701 in wtap_close (wth=0x179dc00) at wtap.c:788
#4  0x00007ffff7b31a77 in wtap_open_offline (filename=0x179a800
"7c51012f016f3e7d168fbf194fa1e932.cap", err=0x7fffffffe100,
err_info=0x7fffffffd690, 
    do_random=0) at file_access.c:386
#5  0x000000000041ea7e in cf_open (cf=0x653ce0, fname=0x179a800
"7c51012f016f3e7d168fbf194fa1e932.cap", is_tempfile=0, err=0x7fffffffe100) at
tshark.c:3699
#6  0x000000000041b707 in main (argc=4, argv=0x7fffffffe238) at tshark.c:1885
(gdb) up
#1  0x00007ffff7b4179c in netmon_sequential_close (wth=0x179dc00) at
netmon.c:935
935            g_free(netmon->frame_table);
(gdb) li
930    netmon_sequential_close(wtap *wth)
931    {
932        netmon_t *netmon = (netmon_t *)wth->priv;
933    
934        if (netmon->frame_table != NULL) {
935            g_free(netmon->frame_table);
936            netmon->frame_table = NULL;
937        }
938    }
939    
(gdb)


You are receiving this mail because:
  • You are watching all bug changes.