Wireshark-bugs: [Wireshark-bugs] [Bug 13219] New: Buildbot crash output: fuzz-2016-12-07-9609.pc
Date: Wed, 07 Dec 2016 21:40:03 +0000
Bug ID 13219
Summary Buildbot crash output: fuzz-2016-12-07-9609.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2016-12-07-9609.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee bugzilla-admin@wireshark.org
Reporter buildbot-do-not-reply@wireshark.org

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2016-12-07-9609.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/13651-nfsv4rdma_mount.pcap

Build host information:
Linux wsbb04 4.4.0-47-generic #68-Ubuntu SMP Wed Oct 26 19:39:52 UTC 2016
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 16.04.1 LTS
Release:    16.04
Codename:    xenial

Buildbot information:
BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_BUILDNUMBER=3810
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_GOT_REVISION=f39389e945e11a82905bc5b71ada85f3b90e9bab

Return value:  0

Dissector bug:  0

Valgrind error count:  1



Git commit
commit f39389e945e11a82905bc5b71ada85f3b90e9bab
Author: Chuck Lever <chuck.lever@oracle.com>
Date:   Tue Dec 6 11:25:59 2016 -0500

    packet-rpcrdma: Fix selection size in chunk list dissectors

    Use proto_item_set_len instead of walking the packet ahead of time
    trying to compute the size.

    Change-Id: I5eb3da1fef45895853cb5b6b198d0310394e4176
    Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
    Reviewed-on: https://code.wireshark.org/review/19120
    Reviewed-by: Michael Mann <mmann78@netscape.net>
    Petri-Dish: Michael Mann <mmann78@netscape.net>
    Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
    Reviewed-by: Anders Broman <a.broman58@gmail.com>


==18459== Memcheck, a memory error detector
==18459== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==18459== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info
==18459== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2016-12-07-9609.pcap
==18459== 
==18459== Invalid read of size 2
==18459==    at 0x69977C1: ib_addr_to_str (address_types.c:451)
==18459==    by 0x699FF8C: col_set_addr (column-utils.c:1913)
==18459==    by 0x699FE77: col_fill_in (column-utils.c:2180)
==18459==    by 0x416797: print_packet (tshark.c:3852)
==18459==    by 0x416389: process_packet (tshark.c:3492)
==18459==    by 0x4140D1: load_cap_file (tshark.c:3234)
==18459==    by 0x4140D1: main (tshark.c:1934)
==18459==  Address 0xffefff5f0 is on thread 1's stack
==18459==  2336 bytes below stack pointer
==18459== 
==18459== 
==18459== HEAP SUMMARY:
==18459==     in use at exit: 6,085,214 bytes in 9,743 blocks
==18459==   total heap usage: 266,280 allocs, 256,537 frees, 37,335,172 bytes
allocated
==18459== 
==18459== LEAK SUMMARY:
==18459==    definitely lost: 360 bytes in 87 blocks
==18459==    indirectly lost: 0 bytes in 0 blocks
==18459==      possibly lost: 0 bytes in 0 blocks
==18459==    still reachable: 6,084,854 bytes in 9,656 blocks
==18459==         suppressed: 0 bytes in 0 blocks
==18459== Rerun with --leak-check=full to see details of leaked memory
==18459== 
==18459== For counts of detected and suppressed errors, rerun with: -v
==18459== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.