Wireshark-bugs: [Wireshark-bugs] [Bug 8717] Buildbot crash output: fuzz-2013-05-25-10691.pcap
Date: Mon, 27 May 2013 23:20:32 +0000

changed bug 8717

What Removed Added
CC   eapache@gmail.com

Comment # 1 on bug 8717 from
==9488== Invalid write of size 1
==9488==    at 0x65DA585: dissect_pft (packet-dcp-etsi.c:217)
==9488==    by 0x63D84F7: call_dissector_through_handle (packet.c:458)
==9488==    by 0x63D8D2C: call_dissector_work (packet.c:552)
==9488==    by 0x63D986E: dissector_try_string (packet.c:1228)
==9488==    by 0x65D9E3C: dissect_dcp_etsi (packet-dcp-etsi.c:199)
==9488==    by 0x63DA36F: dissector_try_heuristic (packet.c:1807)
==9488==    by 0x6A77648: decode_udp_ports (packet-udp.c:282)
==9488==    by 0x6A77CBF: dissect (packet-udp.c:596)
==9488==    by 0x63D84F7: call_dissector_through_handle (packet.c:458)
==9488==    by 0x63D8D2C: call_dissector_work (packet.c:552)
==9488==    by 0x63D957F: dissector_try_uint_new (packet.c:969)
==9488==    by 0x63D95D6: dissector_try_uint (packet.c:995)
==9488==  Address 0xfd5f37a is 0 bytes after a block of size 65,786 alloc'd
==9488==    at 0x4C2CD7B: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9488==    by 0x93BBCF0: g_malloc (gmem.c:159)
==9488==    by 0x65DA537: dissect_pft (packet-dcp-etsi.c:346)
==9488==    by 0x63D84F7: call_dissector_through_handle (packet.c:458)
==9488==    by 0x63D8D2C: call_dissector_work (packet.c:552)
==9488==    by 0x63D986E: dissector_try_string (packet.c:1228)
==9488==    by 0x65D9E3C: dissect_dcp_etsi (packet-dcp-etsi.c:199)
==9488==    by 0x63DA36F: dissector_try_heuristic (packet.c:1807)
==9488==    by 0x6A77648: decode_udp_ports (packet-udp.c:282)
==9488==    by 0x6A77CBF: dissect (packet-udp.c:596)
==9488==    by 0x63D84F7: call_dissector_through_handle (packet.c:458)
==9488==    by 0x63D8D2C: call_dissector_work (packet.c:552)
==9488== 
==9488== Invalid read of size 1
==9488==    at 0x65DA577: dissect_pft (packet-dcp-etsi.c:217)
==9488==    by 0x63D84F7: call_dissector_through_handle (packet.c:458)
==9488==    by 0x63D8D2C: call_dissector_work (packet.c:552)
==9488==    by 0x63D986E: dissector_try_string (packet.c:1228)
==9488==    by 0x65D9E3C: dissect_dcp_etsi (packet-dcp-etsi.c:199)
==9488==    by 0x63DA36F: dissector_try_heuristic (packet.c:1807)
==9488==    by 0x6A77648: decode_udp_ports (packet-udp.c:282)
==9488==    by 0x6A77CBF: dissect (packet-udp.c:596)
==9488==    by 0x63D84F7: call_dissector_through_handle (packet.c:458)
==9488==    by 0x63D8D2C: call_dissector_work (packet.c:552)
==9488==    by 0x63D957F: dissector_try_uint_new (packet.c:969)
==9488==    by 0x63D95D6: dissector_try_uint (packet.c:995)
==9488==  Address 0xfa070fa is 0 bytes after a block of size 65,786 alloc'd
==9488==    at 0x4C2CD7B: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9488==    by 0x93BBCF0: g_malloc (gmem.c:159)
==9488==    by 0x63F5DDB: fragment_defragment_and_free.isra.0
(reassemble.c:1488)
==9488==    by 0x63F6A19: fragment_add_seq_common (reassemble.c:1763)
==9488==    by 0x63F6D45: fragment_add_seq_check_work (reassemble.c:1969)
==9488==    by 0x63F7397: fragment_add_seq_check (reassemble.c:2013)
==9488==    by 0x65DA241: dissect_pft (packet-dcp-etsi.c:400)
==9488==    by 0x63D84F7: call_dissector_through_handle (packet.c:458)
==9488==    by 0x63D8D2C: call_dissector_work (packet.c:552)
==9488==    by 0x63D986E: dissector_try_string (packet.c:1228)
==9488==    by 0x65D9E3C: dissect_dcp_etsi (packet-dcp-etsi.c:199)
==9488==    by 0x63DA36F: dissector_try_heuristic (packet.c:1807)


You are receiving this mail because:
  • You are watching all bug changes.