Wireshark-bugs: [Wireshark-bugs] [Bug 13200] New: Buildbot crash output: fuzz-2016-12-02-8532.pc
Date: Fri, 02 Dec 2016 22:50:02 +0000
Bug ID | 13200 |
---|---|
Summary | Buildbot crash output: fuzz-2016-12-02-8532.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2016-12-02-8532.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | [email protected] |
Reporter | [email protected] |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2016-12-02-8532.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/11275-cops-fuzz-test.pcap Build host information: Linux wsbb04 4.4.0-47-generic #68-Ubuntu SMP Wed Oct 26 19:39:52 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 16.04.1 LTS Release: 16.04 Codename: xenial Buildbot information: BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark BUILDBOT_WORKERNAME=clang-code-analysis BUILDBOT_BUILDNUMBER=3801 BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_GOT_REVISION=2ec9093ed8a21737bfad150bc9daa6b3a6bb103b Return value: 0 Dissector bug: 0 Valgrind error count: 1 Git commit commit 2ec9093ed8a21737bfad150bc9daa6b3a6bb103b Author: Michael Mann <[email protected]> Date: Fri Dec 2 11:57:43 2016 -0500 Make SMB2 MessageId field a FT_UINT64 Also adjust the smb2_info_t structure that handles the value. Bug: 12915 Change-Id: Ia314b8dc840b9d26d2c1d185f06ef93f242a3a7b Reviewed-on: https://code.wireshark.org/review/19019 Petri-Dish: Michael Mann <[email protected]> Tested-by: Petri Dish Buildbot <[email protected]> Reviewed-by: Michael Mann <[email protected]> ==30804== Memcheck, a memory error detector ==30804== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==30804== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==30804== Command: /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2016-12-02-8532.pcap ==30804== ==30804== Conditional jump or move depends on uninitialised value(s) ==30804== at 0x6B9CEF4: dissect_cops_pdu (packet-cops.c:1102) ==30804== by 0x718F6F5: tcp_dissect_pdus (packet-tcp.c:3468) ==30804== by 0x6B9B8C1: dissect_cops (packet-cops.c:1134) ==30804== by 0x69AD955: call_dissector_through_handle (packet.c:650) ==30804== by 0x69AD955: call_dissector_work (packet.c:725) ==30804== by 0x69AD81E: dissector_try_uint_new (packet.c:1290) ==30804== by 0x718FC0F: decode_tcp_ports (packet-tcp.c:5420) ==30804== by 0x7190F2F: process_tcp_payload (packet-tcp.c:5483) ==30804== by 0x7190488: desegment_tcp (packet-tcp.c:2990) ==30804== by 0x7190488: dissect_tcp_payload (packet-tcp.c:5550) ==30804== by 0x7194EF7: dissect_tcp (packet-tcp.c:6434) ==30804== by 0x69AD955: call_dissector_through_handle (packet.c:650) ==30804== by 0x69AD955: call_dissector_work (packet.c:725) ==30804== by 0x69AD81E: dissector_try_uint_new (packet.c:1290) ==30804== by 0x6DDE0C2: ip_try_dissect (packet-ip.c:1978) ==30804== by 0x6DDE0C2: dissect_ip_v4 (packet-ip.c:2441) ==30804== ==30804== ==30804== HEAP SUMMARY: ==30804== in use at exit: 6,086,006 bytes in 9,751 blocks ==30804== total heap usage: 266,192 allocs, 256,441 frees, 37,350,306 bytes allocated ==30804== ==30804== LEAK SUMMARY: ==30804== definitely lost: 536 bytes in 92 blocks ==30804== indirectly lost: 768 bytes in 6 blocks ==30804== possibly lost: 0 bytes in 0 blocks ==30804== still reachable: 6,084,702 bytes in 9,653 blocks ==30804== suppressed: 0 bytes in 0 blocks ==30804== Rerun with --leak-check=full to see details of leaked memory ==30804== ==30804== For counts of detected and suppressed errors, rerun with: -v ==30804== Use --track-origins=yes to see where uninitialised values come from ==30804== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 13200] Buildbot crash output: fuzz-2016-12-02-8532.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 13200] Buildbot crash output: fuzz-2016-12-02-8532.pcap
- Prev by Date: [Wireshark-bugs] [Bug 13196] Some RPC-over-RDMA frames are not recognized as RPC-over-RDMA
- Next by Date: [Wireshark-bugs] [Bug 5208] RTP dynamic payload type can not be dissected correctly in a RTSP session
- Previous by thread: [Wireshark-bugs] [Bug 13199] RPC-over-RDMA dissector requires ConnectionRequest packet in capture
- Next by thread: [Wireshark-bugs] [Bug 13200] Buildbot crash output: fuzz-2016-12-02-8532.pcap
- Index(es):