Bug ID |
13224
|
Summary |
Buildbot crash output: fuzz-2016-12-08-20604.pcap
|
Product |
Wireshark
|
Version |
unspecified
|
Hardware |
x86-64
|
URL |
https://www.wireshark.org/download/automated/captures/fuzz-2016-12-08-20604.pcap
|
OS |
Ubuntu
|
Status |
CONFIRMED
|
Severity |
Major
|
Priority |
High
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Problems have been found with the following capture file:
https://www.wireshark.org/download/automated/captures/fuzz-2016-12-08-20604.pcap
stderr:
Input file: /home/wireshark/menagerie/menagerie/12802-iser_login.pcap
Build host information:
Linux wsbb04 4.4.0-47-generic #68-Ubuntu SMP Wed Oct 26 19:39:52 UTC 2016
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description: Ubuntu 16.04.1 LTS
Release: 16.04
Codename: xenial
Buildbot information:
BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_BUILDNUMBER=3813
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_GOT_REVISION=5e3f8236b9945eac9105b65a14488374aa7a836f
Return value: 0
Dissector bug: 0
Valgrind error count: 1
Git commit
commit 5e3f8236b9945eac9105b65a14488374aa7a836f
Author: Chuck Lever <[email protected]>
Date: Sat Nov 12 14:40:31 2016 -0500
packet-rpcrdma: Select correct size of transport header
Nit: Make it easier to see the transition between the end of the
RPC-over-RDMA transport header and the start of the RPC header.
Calculate the selection size of the RPC-over-RDMA header
properly, including the size of the chunk lists.
Change-Id: I84bc7d970a95e8f50a21a45ded386322711b6512
Signed-off-by: Chuck Lever <[email protected]>
Reviewed-on: https://code.wireshark.org/review/19034
Reviewed-by: Michael Mann <[email protected]>
Petri-Dish: Michael Mann <[email protected]>
Tested-by: Petri Dish Buildbot <[email protected]>
Reviewed-by: Anders Broman <[email protected]>
==15768== Memcheck, a memory error detector
==15768== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==15768== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info
==15768== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2016-12-08-20604.pcap
==15768==
==15768== Invalid read of size 2
==15768== at 0x69977A1: ib_addr_to_str (address_types.c:451)
==15768== by 0x699FF6C: col_set_addr (column-utils.c:1913)
==15768== by 0x699FE57: col_fill_in (column-utils.c:2180)
==15768== by 0x416797: print_packet (tshark.c:3852)
==15768== by 0x416389: process_packet (tshark.c:3492)
==15768== by 0x4140D1: load_cap_file (tshark.c:3234)
==15768== by 0x4140D1: main (tshark.c:1934)
==15768== Address 0xffefff5f0 is on thread 1's stack
==15768== 2336 bytes below stack pointer
==15768==
==15768==
==15768== HEAP SUMMARY:
==15768== in use at exit: 6,083,167 bytes in 9,742 blocks
==15768== total heap usage: 293,099 allocs, 283,357 frees, 38,043,175 bytes
allocated
==15768==
==15768== LEAK SUMMARY:
==15768== definitely lost: 360 bytes in 87 blocks
==15768== indirectly lost: 0 bytes in 0 blocks
==15768== possibly lost: 0 bytes in 0 blocks
==15768== still reachable: 6,082,807 bytes in 9,655 blocks
==15768== suppressed: 0 bytes in 0 blocks
==15768== Rerun with --leak-check=full to see details of leaked memory
==15768==
==15768== For counts of detected and suppressed errors, rerun with: -v
==15768== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
[ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.