Bug ID |
8457
|
Summary |
Buildbot crash output: fuzz-2013-03-10-22590.pcap
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
unspecified
|
Hardware |
x86-64
|
URL |
http://www.wireshark.org/download/automated/captures/fuzz-2013-03-10-22590.pcap
|
OS |
Ubuntu
|
Status |
CONFIRMED
|
Severity |
Major
|
Priority |
High
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Problems have been found with the following capture file:
http://www.wireshark.org/download/automated/captures/fuzz-2013-03-10-22590.pcap
stderr:
Input file: /home/wireshark/menagerie/menagerie/smbtorture.cap.gz
Build host information:
Linux wsbb04 3.2.0-38-generic #61-Ubuntu SMP Tue Feb 19 12:18:21 UTC 2013
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description: Ubuntu 12.04.2 LTS
Release: 12.04
Codename: precise
Buildbot information:
BUILDBOT_REPOSITORY=http://code.wireshark.org/git/wireshark
BUILDBOT_BUILDNUMBER=1838
BUILDBOT_URL=http://buildbot.wireshark.org/trunk/
BUILDBOT_BUILDERNAME=Clang-Code-Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=da07699dd36376e3b25c038a6e40954afd07baa1
Return value: 139
Dissector bug: 0
Valgrind error count: 0
Git commit
commit da07699dd36376e3b25c038a6e40954afd07baa1
Author: Michael Tüxen <[email protected]>
Date: Sun Mar 10 11:57:40 2013 +0000
Make the memory limit (in bytes or packets) used for storing packets
configurable via command line options and print specific drop numbers
at the end. This allows to tune the buffering when using multiple
threads.
This also fixes a logic arrow in enforcing the limits.
The patch for the enhanced counters is from Anders Broman.
svn path=/trunk/; revision=48223
Command and args: ./tshark -nVxr
** (process:15140): WARNING **: Dissector bug, protocol RPKI-Router Protocol,
in packet 1404: column-utils.c:531: failed assertion "!ep_verify_pointer(str)"
** (process:15140): WARNING **: Dissector bug, protocol RPKI-Router Protocol,
in packet 11633: column-utils.c:531: failed assertion "!ep_verify_pointer(str)"
[ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.