Bug ID |
9680
|
Summary |
Buildbot crash output: fuzz-2014-01-21-1104.pcap
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
unspecified
|
Hardware |
x86-64
|
URL |
http://www.wireshark.org/download/automated/captures/fuzz-2014-01-21-1104.pcap
|
OS |
Ubuntu
|
Status |
CONFIRMED
|
Severity |
Major
|
Priority |
High
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Problems have been found with the following capture file:
http://www.wireshark.org/download/automated/captures/fuzz-2014-01-21-1104.pcap
stderr:
Input file: /home/wireshark/menagerie/menagerie/10052-wireshark_vs_omnipeek.jpg
Build host information:
Linux wsbb04 3.2.0-58-generic #88-Ubuntu SMP Tue Dec 3 17:37:58 UTC 2013 x86_64
x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description: Ubuntu 12.04.4 LTS
Release: 12.04
Codename: precise
Buildbot information:
BUILDBOT_REPOSITORY=https://code.wireshark.org/review/wireshark
BUILDBOT_BUILDNUMBER=2526
BUILDBOT_URL=http://buildbot.wireshark.org/trunk/
BUILDBOT_BUILDERNAME=Clang-Code-Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=8f8eeb5dcea62a1d4dd27cec193756844fe12c43
Return value: 2
Dissector bug: 0
Valgrind error count: 0
Git commit
commit 8f8eeb5dcea62a1d4dd27cec193756844fe12c43
Author: Guy Harris <[email protected]>
Date: Tue Jan 21 08:50:35 2014 +0000
Check the return of wtap_dump_close() even if we've gotten a read error;
the only reason not to check it is if we've already gotten a write error
and another write error would be superfluous (either "you got two of the
same error" or "you got an I/O error *and* you ran out of disk
space/disk quota" is of limited interest).
Discard the return value of wtap_dump_close() in the case where we've
already gotten a write error, in the hopes of squelching a Coverity
warning.
svn path=/trunk/; revision=54872
Command and args: ./tshark -nVxr
tshark: The file
"/fuzz/buildbot/clangcodeanalysis/menagerie-fuzz/fuzz-2014-01-21-1104.pcap"
appears to be damaged or corrupt.
(pcapng_read_packet_block: cap_len 634477 is larger than WTAP_MAX_PACKET_SIZE
65535)
[ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.