Wireshark-bugs: [Wireshark-bugs] [Bug 9981] Buildbot crash output: fuzz-2014-04-10-11638.pcap
Comment # 1
on bug 9981
from Evan Huus
Does not happen on trunk.
==15629== Invalid write of size 1
==15629== at 0x6A2DEE2: fp_set_per_packet_inf_from_conv.isra.4
(packet-umts_fp.c:3999)
==15629== by 0x6A321A2: dissect_fp (packet-umts_fp.c:4226)
==15629== by 0x63B8AD3: call_dissector_through_handle (packet.c:458)
==15629== by 0x63B9187: call_dissector_work (packet.c:549)
==15629== by 0x63AC814: try_conversation_dissector (conversation.c:1217)
==15629== by 0x6A29405: decode_udp_ports (packet-udp.c:239)
==15629== by 0x6A29A8F: dissect (packet-udp.c:596)
==15629== by 0x63B8AD3: call_dissector_through_handle (packet.c:458)
==15629== by 0x63B9187: call_dissector_work (packet.c:549)
==15629== by 0x63B998B: dissector_try_uint_new (packet.c:966)
==15629== by 0x63B99E6: dissector_try_uint (packet.c:992)
==15629== by 0x672F9DF: dissect_ip (packet-ip.c:2417)
==15629== Address 0x13cb6a44 is 0 bytes after a block of size 772 alloc'd
==15629== at 0x4C2AB80: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==15629== by 0x9369610: g_malloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4000.0)
==15629== by 0x63ACD06: emem_alloc_glib (emem.c:830)
==15629== by 0x63AD0FD: emem_alloc (emem.c:860)
==15629== by 0x63ADB28: se_alloc0 (emem.c:897)
==15629== by 0x6A2DD83: fp_set_per_packet_inf_from_conv.isra.4
(packet-umts_fp.c:3976)
==15629== by 0x6A321A2: dissect_fp (packet-umts_fp.c:4226)
==15629== by 0x63B8AD3: call_dissector_through_handle (packet.c:458)
==15629== by 0x63B9187: call_dissector_work (packet.c:549)
==15629== by 0x63AC814: try_conversation_dissector (conversation.c:1217)
==15629== by 0x6A29405: decode_udp_ports (packet-udp.c:239)
==15629== by 0x6A29A8F: dissect (packet-udp.c:596)
You are receiving this mail because:
- You are watching all bug changes.