Wireshark-bugs: [Wireshark-bugs] [Bug 13168] New: Buildbot crash output: fuzz-2016-11-23-3660.pc

Date: Wed, 23 Nov 2016 15:00:03 +0000
Bug ID 13168
Summary Buildbot crash output: fuzz-2016-11-23-3660.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2016-11-23-3660.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2016-11-23-3660.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/11275-cops-fuzz-test.pcap

Build host information:
Linux wsbb04 4.4.0-47-generic #68-Ubuntu SMP Wed Oct 26 19:39:52 UTC 2016
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 16.04.1 LTS
Release:    16.04
Codename:    xenial

Buildbot information:
BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_BUILDNUMBER=3787
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_GOT_REVISION=6930ded24ab64b6de646ae3e120995b44188bc84

Return value:  0

Dissector bug:  0

Valgrind error count:  1



Git commit
commit 6930ded24ab64b6de646ae3e120995b44188bc84
Author: Guy Harris <[email protected]>
Date:   Tue Nov 22 11:19:37 2016 -0800

    Include <io.h> and <fcntl.h> for _setmode().

    Change-Id: I1910275653ef4a985e9894f01cf5cb5fa33070d4
    Reviewed-on: https://code.wireshark.org/review/18928
    Petri-Dish: Guy Harris <[email protected]>
    Reviewed-by: Guy Harris <[email protected]>


==8655== Memcheck, a memory error detector
==8655== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==8655== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info
==8655== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2016-11-23-3660.pcap
==8655== 
==8655== Conditional jump or move depends on uninitialised value(s)
==8655==    at 0x6B9B2D4: dissect_cops_pdu (packet-cops.c:1102)
==8655==    by 0x718B345: tcp_dissect_pdus (packet-tcp.c:3468)
==8655==    by 0x6B99CA1: dissect_cops (packet-cops.c:1134)
==8655==    by 0x69AB795: call_dissector_through_handle (packet.c:650)
==8655==    by 0x69AB795: call_dissector_work (packet.c:725)
==8655==    by 0x69AB65E: dissector_try_uint_new (packet.c:1290)
==8655==    by 0x718B85F: decode_tcp_ports (packet-tcp.c:5420)
==8655==    by 0x718CB7F: process_tcp_payload (packet-tcp.c:5483)
==8655==    by 0x718C0D8: desegment_tcp (packet-tcp.c:2990)
==8655==    by 0x718C0D8: dissect_tcp_payload (packet-tcp.c:5550)
==8655==    by 0x7190B47: dissect_tcp (packet-tcp.c:6434)
==8655==    by 0x69AB795: call_dissector_through_handle (packet.c:650)
==8655==    by 0x69AB795: call_dissector_work (packet.c:725)
==8655==    by 0x69AB65E: dissector_try_uint_new (packet.c:1290)
==8655==    by 0x6DDC2D2: ip_try_dissect (packet-ip.c:1978)
==8655==    by 0x6DDC2D2: dissect_ip_v4 (packet-ip.c:2441)
==8655== 
==8655== 
==8655== HEAP SUMMARY:
==8655==     in use at exit: 6,085,679 bytes in 9,733 blocks
==8655==   total heap usage: 266,040 allocs, 256,307 frees, 37,348,385 bytes
allocated
==8655== 
==8655== LEAK SUMMARY:
==8655==    definitely lost: 536 bytes in 92 blocks
==8655==    indirectly lost: 768 bytes in 6 blocks
==8655==      possibly lost: 0 bytes in 0 blocks
==8655==    still reachable: 6,084,375 bytes in 9,635 blocks
==8655==         suppressed: 0 bytes in 0 blocks
==8655== Rerun with --leak-check=full to see details of leaked memory
==8655== 
==8655== For counts of detected and suppressed errors, rerun with: -v
==8655== Use --track-origins=yes to see where uninitialised values come from
==8655== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.