Alessio, one of the calls to the library strncpy() function in sniffit contains "illegal" data (which results in a the application trying to access a memory location outside of its address space). My guess is that this is the one in sn_analyse.c You should recompile sniffit with debug support and use gdb to check this (and possibly the other four calls in sniffit.0.3.7) setting appropriate breakpoints and checking the values of the variables involved (I would pay attention to the value of MTU).
Once we identify the guilty call and associated variable(s) we can try to trace it back to the bug that causes it. ** Changed in: sniffit (Ubuntu) Status: Unconfirmed => Needs Info -- Segmentation Fault https://bugs.launchpad.net/bugs/107180 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs