Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 8350] New: Memory leaks in packet-sdp.c

Date: Mon, 18 Feb 2013 18:07:38 +0000
Bug ID 8350
Summary Memory leaks in packet-sdp.c
Classification Unclassified
Product Wireshark
Version unspecified
Hardware All
OS All
Status UNCONFIRMED
Severity Normal
Priority Low
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Build Information:

--
Using the capture from https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8343
valgrind is reporting the following leaks:

==13915== 39,392 (17,952 direct, 21,440 indirect) bytes in 204 blocks are
definitely lost in loss record 31,551 of 31,568
==13915==    at 0x4C2CD7B: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==13915==    by 0x9255CD0: g_malloc (gmem.c:159)
==13915==    by 0x926AEE2: g_slice_alloc (gslice.c:1003)
==13915==    by 0x923F2E2: g_hash_table_new_full (ghash.c:653)
==13915==    by 0x691FBBB: dissect_sdp (packet-sdp.c:2000)
==13915==    by 0x6375657: call_dissector_through_handle (packet.c:458)
==13915==    by 0x6375EFC: call_dissector_work (packet.c:549)
==13915==    by 0x6376A2E: dissector_try_string (packet.c:1228)
==13915==    by 0x6934B09: dissect_sip_common (packet-sip.c:3159)
==13915==    by 0x69387EF: dissect_sip (packet-sip.c:2003)
==13915==    by 0x637569E: call_dissector_through_handle (packet.c:454)
==13915==    by 0x6375EFC: call_dissector_work (packet.c:549)

==13915== 23,232 (10,560 direct, 12,672 indirect) bytes in 120 blocks are
definitely lost in loss record 31,543 of 31,568
==13915==    at 0x4C2CD7B: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==13915==    by 0x9255CD0: g_malloc (gmem.c:159)
==13915==    by 0x926AEE2: g_slice_alloc (gslice.c:1003)
==13915==    by 0x923F2E2: g_hash_table_new_full (ghash.c:653)
==13915==    by 0x69206EF: setup_sdp_transport (packet-sdp.c:1733)
==13915==    by 0x6937CB7: dissect_sip_common (packet-sip.c:3143)
==13915==    by 0x69387EF: dissect_sip (packet-sip.c:2003)
==13915==    by 0x637569E: call_dissector_through_handle (packet.c:454)
==13915==    by 0x6375EFC: call_dissector_work (packet.c:549)
==13915==    by 0x637673F: dissector_try_uint_new (packet.c:969)
==13915==    by 0x6376796: dissector_try_uint (packet.c:995)
==13915==    by 0x69F2E6F: decode_udp_ports (packet-udp.c:271)

It looks like the hash table isn't getting freed properly in some cases?


You are receiving this mail because:
  • You are watching all bug changes.