Wireshark-bugs: [Wireshark-bugs] [Bug 12344] Buildbot crash output: fuzz-2016-04-16-19092.pcap
Comment # 1
on bug 12344
from Guy Harris
Crashes in Wireshark 2.1.0 (v2.1.0rc0-2701-geab6386 from master) with
0 libwireshark.0.dylib 0x0000000102a5ea0c dissect_http_message +
364 (packet-http.c:833)
1 libwireshark.0.dylib 0x0000000102a5d828 dissect_http + 808
(packet-http.c:3067)
2 libwireshark.0.dylib 0x000000010267eb9b call_dissector_work +
235 (packet.c:656)
3 libwireshark.0.dylib 0x000000010267ea75 dissector_try_uint_new
+ 101 (packet.c:1191)
4 libwireshark.0.dylib 0x0000000102d925c2 dissect_payload + 194
(packet-sctp.c:2509)
5 libwireshark.0.dylib 0x0000000102d91377 dissect_data_chunk +
3175 (packet-sctp.c:3426)
6 libwireshark.0.dylib 0x0000000102d8f1c9 dissect_sctp_chunk +
1769 (packet-sctp.c:4381)
7 libwireshark.0.dylib 0x0000000102d8e88d dissect_sctp_packet +
3597 (packet-sctp.c:4539)
8 libwireshark.0.dylib 0x0000000102d8d823 dissect_sctp + 387
(packet-sctp.c:4764)
9 libwireshark.0.dylib 0x000000010267eb9b call_dissector_work +
235 (packet.c:656)
10 libwireshark.0.dylib 0x000000010267ea75 dissector_try_uint_new
+ 101 (packet.c:1191)
11 libwireshark.0.dylib 0x0000000102ab8550 ip_try_dissect + 128
(packet-ip.c:1977)
12 libwireshark.0.dylib 0x0000000102aba529 dissect_ip_v4 + 5833
(packet-ip.c:2476)
13 libwireshark.0.dylib 0x000000010267eb9b call_dissector_work +
235 (packet.c:656)
14 libwireshark.0.dylib 0x000000010267ec83 dissector_try_uint +
99 (packet.c:1191)
15 libwireshark.0.dylib 0x0000000102975cf6 dissect_ethertype +
326 (packet-ethertype.c:257)
16 libwireshark.0.dylib 0x000000010267eb9b call_dissector_work +
235 (packet.c:656)
17 libwireshark.0.dylib 0x000000010267e0c2
call_dissector_with_data + 50 (packet.c:2774)
18 libwireshark.0.dylib 0x00000001029755a1 dissect_eth_common +
3041 (packet-eth.c:540)
19 libwireshark.0.dylib 0x00000001029749a0 dissect_eth + 256
(packet-eth.c:838)
20 libwireshark.0.dylib 0x000000010267eb9b call_dissector_work +
235 (packet.c:656)
21 libwireshark.0.dylib 0x000000010267ea75 dissector_try_uint_new
+ 101 (packet.c:1191)
22 libwireshark.0.dylib 0x00000001029a3c60 dissect_frame + 3280
(packet-frame.c:492)
23 libwireshark.0.dylib 0x000000010267eb9b call_dissector_work +
235 (packet.c:656)
24 libwireshark.0.dylib 0x000000010267e0c2
call_dissector_with_data + 50 (packet.c:2774)
25 libwireshark.0.dylib 0x000000010267df9d dissect_record + 589
(packet.c:541)
26 libwireshark.0.dylib 0x0000000102672674
epan_dissect_run_with_taps + 68 (epan.c:377)
27 wireshark 0x0000000101cff531
add_packet_to_packet_list + 257 (file.c:1126)
28 wireshark 0x0000000101cf99cf read_packet + 447
(file.c:1214)
29 wireshark 0x0000000101cf946d cf_read + 1373
(file.c:597)
30 wireshark 0x0000000101e7c553
MainWindow::openCaptureFile(QString, QString, unsigned int) + 1555
(main_window_slots.cpp:228)
31 wireshark 0x0000000101d023a3 main + 5427
(wireshark-qt.cpp:1360)
32 libdyld.dylib 0x00007fff8b2e35ad start + 1
That's the last line of
gboolean try_desegment_body = (http_desegment_body &&
(!(conv_data->request_method &&
g_str_equal(conv_data->request_method, "HEAD"))) &&
((tcpinfo == NULL) || (!IS_TH_FIN(tcpinfo->flags))));
tcpinfo isn't null, but it is bogus.
You are receiving this mail because:
- You are watching all bug changes.