Wireshark-bugs: [Wireshark-bugs] [Bug 9952] Buildbot crash output: fuzz-2014-04-02-7762.pcap
Date: Wed, 18 Feb 2015 15:16:51 +0000

Comment # 9 on bug 9952 from
Oh good grief.  Yes, it does.  This is now Fedora 21.

~~~
==26555== Invalid read of size 8
==26555==    at 0x64F7707: except_pop (except.c:260)
==26555==    by 0x6786D59: dissect_ethertype (packet-ethertype.c:319)
==26555==    by 0x64FFC7E: call_dissector_through_handle (packet.c:612)
==26555==    by 0x65005C4: call_dissector_work (packet.c:700)
==26555==    by 0x6502221: call_dissector_with_data (packet.c:2386)
==26555==    by 0x6B91135: dissect_sll (packet-sll.c:297)
==26555==    by 0x64FFC43: call_dissector_through_handle (packet.c:614)
==26555==    by 0x65005C4: call_dissector_work (packet.c:700)
==26555==    by 0x6500D0E: dissector_try_uint_new (packet.c:1132)
==26555==    by 0x6500D50: dissector_try_uint (packet.c:1158)
==26555==    by 0x67B93A8: dissect_frame (packet-frame.c:496)
==26555==    by 0x64FFC7E: call_dissector_through_handle (packet.c:612)
==26555==  Address 0xffeffe000 is on thread 1's stack
==26555==  4632 bytes below stack pointer
==26555== 
==26555== Invalid read of size 8
==26555==    at 0x64F7707: except_pop (except.c:260)
==26555==    by 0x67B82E3: dissect_frame (packet-frame.c:555)
==26555==    by 0x64FFC7E: call_dissector_through_handle (packet.c:612)
==26555==    by 0x65005C4: call_dissector_work (packet.c:700)
==26555==    by 0x6502221: call_dissector_with_data (packet.c:2386)
==26555==    by 0x65025FD: dissect_record (packet.c:492)
==26555==    by 0x64F70A3: epan_dissect_run_with_taps (epan.c:343)
==26555==    by 0x413203: process_packet (tshark.c:3619)
==26555==    by 0x40C492: load_cap_file (tshark.c:3380)
==26555==    by 0x40C492: main (tshark.c:2122)
==26555==  Address 0xffefff270 is on thread 1's stack
==26555==  888 bytes below stack pointer
==26555== 
==26555== Invalid read of size 8
==26555==    at 0x64F7707: except_pop (except.c:260)
==26555==    by 0x65024B0: dissect_record (packet.c:502)
==26555==    by 0x64F70A3: epan_dissect_run_with_taps (epan.c:343)
==26555==    by 0x413203: process_packet (tshark.c:3619)
==26555==    by 0x40C492: load_cap_file (tshark.c:3380)
==26555==    by 0x40C492: main (tshark.c:2122)
==26555==  Address 0xffefff670 is on thread 1's stack
==26555==  920 bytes below stack pointer
==26555== 
==26555== Invalid read of size 8
==26555==    at 0x64F7707: except_pop (except.c:260)
==26555==    by 0x40C1D0: main (tshark.c:2139)
==26555==  Address 0xffefffa40 is on thread 1's stack
==26555==  568 bytes below stack pointer
~~~

CPU info (in case that would make any difference):

~~~
processor    : 0
vendor_id    : GenuineIntel
cpu family    : 6
model        : 58
model name    : Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz
stepping    : 9
microcode    : 0x1b
cpu MHz        : 2043.984
cache size    : 8192 KB
physical id    : 0
siblings    : 8
core id        : 0
cpu cores    : 4
apicid        : 0
initial apicid    : 0
fpu        : yes
fpu_exception    : yes
cpuid level    : 13
wp        : yes
flags        : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov
pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm
constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc
aperfmperf eagerfpu pni pclmulqdq dtes64 monitor ds_cpl vmx smx est tm2 ssse3
cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic popcnt tsc_deadline_timer aes xsave
avx f16c rdrand lahf_lm ida arat epb pln pts dtherm tpr_shadow vnmi
flexpriority ept vpid fsgsbase smep erms xsaveopt
bugs        :
bogomips    : 6784.46
clflush size    : 64
cache_alignment    : 64
address sizes    : 36 bits physical, 48 bits virtual
power management:
~~~


You are receiving this mail because:
  • You are watching all bug changes.