Wireshark-bugs: [Wireshark-bugs] [Bug 13169] New: Buildbot crash output: fuzz-2016-11-23-13128.p

Date: Wed, 23 Nov 2016 19:30:03 +0000
Bug ID 13169
Summary Buildbot crash output: fuzz-2016-11-23-13128.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2016-11-23-13128.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2016-11-23-13128.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/11275-cops-fuzz-test.pcap

Build host information:
Linux wsbb04 4.4.0-47-generic #68-Ubuntu SMP Wed Oct 26 19:39:52 UTC 2016
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 16.04.1 LTS
Release:    16.04
Codename:    xenial

Buildbot information:
BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_BUILDNUMBER=3788
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_GOT_REVISION=a85d1361024e9e93f3f73575d7adaef23c2a19a8

Return value:  0

Dissector bug:  0

Valgrind error count:  1



Git commit
commit a85d1361024e9e93f3f73575d7adaef23c2a19a8
Author: Dario Lombardo <[email protected]>
Date:   Mon Nov 21 22:51:26 2016 +0100

    debian-setup: remove lsb_relese check.

    It is not used anymore and breaks docker builds.

    Change-Id: Ic4a2e6abf2da8059f28fcee19e611a8a83165895
    Reviewed-on: https://code.wireshark.org/review/18934
    Reviewed-by: Peter Wu <[email protected]>


==9800== Memcheck, a memory error detector
==9800== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==9800== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info
==9800== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2016-11-23-13128.pcap
==9800== 
==9800== Conditional jump or move depends on uninitialised value(s)
==9800==    at 0x6B9B2D4: dissect_cops_pdu (packet-cops.c:1102)
==9800==    by 0x718B345: tcp_dissect_pdus (packet-tcp.c:3468)
==9800==    by 0x6B99CA1: dissect_cops (packet-cops.c:1134)
==9800==    by 0x69AB795: call_dissector_through_handle (packet.c:650)
==9800==    by 0x69AB795: call_dissector_work (packet.c:725)
==9800==    by 0x69AB65E: dissector_try_uint_new (packet.c:1290)
==9800==    by 0x718B85F: decode_tcp_ports (packet-tcp.c:5420)
==9800==    by 0x718CB7F: process_tcp_payload (packet-tcp.c:5483)
==9800==    by 0x718C0D8: desegment_tcp (packet-tcp.c:2990)
==9800==    by 0x718C0D8: dissect_tcp_payload (packet-tcp.c:5550)
==9800==    by 0x7190B47: dissect_tcp (packet-tcp.c:6434)
==9800==    by 0x69AB795: call_dissector_through_handle (packet.c:650)
==9800==    by 0x69AB795: call_dissector_work (packet.c:725)
==9800==    by 0x69AB65E: dissector_try_uint_new (packet.c:1290)
==9800==    by 0x6DDC2D2: ip_try_dissect (packet-ip.c:1978)
==9800==    by 0x6DDC2D2: dissect_ip_v4 (packet-ip.c:2441)
==9800== 
==9800== 
==9800== HEAP SUMMARY:
==9800==     in use at exit: 6,085,680 bytes in 9,733 blocks
==9800==   total heap usage: 266,095 allocs, 256,362 frees, 37,349,940 bytes
allocated
==9800== 
==9800== LEAK SUMMARY:
==9800==    definitely lost: 536 bytes in 92 blocks
==9800==    indirectly lost: 768 bytes in 6 blocks
==9800==      possibly lost: 0 bytes in 0 blocks
==9800==    still reachable: 6,084,376 bytes in 9,635 blocks
==9800==         suppressed: 0 bytes in 0 blocks
==9800== Rerun with --leak-check=full to see details of leaked memory
==9800== 
==9800== For counts of detected and suppressed errors, rerun with: -v
==9800== Use --track-origins=yes to see where uninitialised values come from
==9800== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.