Wireshark-bugs: [Wireshark-bugs] [Bug 10941] New: Buildbot crash output: fuzz-2015-02-07-12036.p

Date: Sat, 07 Feb 2015 22:30:06 +0000
Bug ID 10941
Summary Buildbot crash output: fuzz-2015-02-07-12036.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2015-02-07-12036.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2015-02-07-12036.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/c06-ldapv3-enc-r1.pcap.gz

Build host information:
Linux wsbb04 3.13.0-44-generic #73-Ubuntu SMP Tue Dec 16 00:22:43 UTC 2014
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 14.04.1 LTS
Release:    14.04
Codename:    trusty

Buildbot information:
BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark
BUILDBOT_BUILDNUMBER=3136
BUILDBOT_URL=http://buildbot.wireshark.org/trunk/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=2c65b33b2169a1a40766d55f8eb6339e7b412794

Return value:  139

Dissector bug:  0

Valgrind error count:  0



Git commit
commit 2c65b33b2169a1a40766d55f8eb6339e7b412794
Author: Peter Wu <[email protected]>
Date:   Sat Feb 7 00:49:31 2015 +0100

    Fix RTP crash on RTP analysis attempt

    The tap listener was handling rtpstream_tapinfo_t* types while other
    users was expecting a GList* instead. Fix this and avoid future
    confusion by replacing void* pointers.

    Ping-Bug: 10714
    Change-Id: I66f62eaaed4a529714264bbf4e7ad1e72b46ce5a
    Reviewed-on: https://code.wireshark.org/review/6997
    Reviewed-by: Gerald Combs <[email protected]>


Command and args:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark
-nVxr


[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.