Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 1001] free() invalid pointer in dissect_802_3 at packet-ie

Date: Sun, 30 Jul 2006 20:47:16 +0000 (GMT)
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1001





------- Comment #24 from dgautheron@xxxxxxxx  2006-07-30 20:47 GMT -------
(In reply to comment #23)
> (In reply to comment #22)
> > if I didn't screw my math next_tvb offset is inside except_ch.
> 
> Is that right?  I think except_ch is 28 bytes long so it ends just before
? here sizeof(struct except_catch) is 624, it's a ppc box but a x86 one
shouldn't be that small.

> Do any other functions have more than one TRY/CATCH/ENDTRY set?  If so, maybe
> we can create a pcap file with packets that will test those functions.
>
Yes cf 'grep -r ENDTRY .' output. Anyway it doesn't matter, IMO you can't trust
SSP gcc output. 

Isn't SSP patch old and some of its ideas used in gcc 4.1?  

This bug should be closed as WONTFIX, we can't workaround all faulty
toolchains.


-- 
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.