https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13187

            Bug ID: 13187
           Summary: Buildbot crash output: fuzz-2016-11-30-31444.pcap
           Product: Wireshark
           Version: unspecified
          Hardware: x86-64
               URL: https://www.wireshark.org/download/automated/captures/
                    fuzz-2016-11-30-31444.pcap
                OS: Ubuntu
            Status: CONFIRMED
          Severity: Major
          Priority: High
         Component: Dissection engine (libwireshark)
          Assignee: bugzilla-ad...@wireshark.org
          Reporter: buildbot-do-not-re...@wireshark.org

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2016-11-30-31444.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/11275-cops-fuzz-test.pcap

Build host information:
Linux wsbb04 4.4.0-47-generic #68-Ubuntu SMP Wed Oct 26 19:39:52 UTC 2016
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 16.04.1 LTS
Release:    16.04
Codename:    xenial

Buildbot information:
BUILDBOT_REPOSITORY=ssh://wireshark-build...@code.wireshark.org:29418/wireshark
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_BUILDNUMBER=3800
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_GOT_REVISION=7fe45cc0ec4e8bc1c3d5cd27c98feb8ecbb2b1b4

Return value:  0

Dissector bug:  0

Valgrind error count:  1



Git commit
commit 7fe45cc0ec4e8bc1c3d5cd27c98feb8ecbb2b1b4
Author: Peter Wu <pe...@lekensteyn.nl>
Date:   Wed Nov 23 16:28:34 2016 +0100

    Qt: fix GoToPacket when Voip Calls dialog is closed

    After opening the Call Flows dialog from the Voip Calls dialog, followed
    by closing the Voip Calls dialog, the Go To Packet functionality in the
    Call Flows dialog is broken. That happens because the signal is not
    proxied anymore.

    Just remove all these indirections via signals and directly update the
    selected packet.

    Change-Id: I9c6d519dbe800e4dfdf0407d832f17819b344e46
    Reviewed-on: https://code.wireshark.org/review/18933
    Petri-Dish: Peter Wu <pe...@lekensteyn.nl>
    Tested-by: Petri Dish Buildbot <buildbot-no-re...@wireshark.org>
    Reviewed-by: Gerald Combs <ger...@wireshark.org>


==16247== Memcheck, a memory error detector
==16247== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==16247== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info
==16247== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2016-11-30-31444.pcap
==16247== 
==16247== Conditional jump or move depends on uninitialised value(s)
==16247==    at 0x6B9C8F4: dissect_cops_pdu (packet-cops.c:1102)
==16247==    by 0x718E655: tcp_dissect_pdus (packet-tcp.c:3468)
==16247==    by 0x6B9B2C1: dissect_cops (packet-cops.c:1134)
==16247==    by 0x69ACDB5: call_dissector_through_handle (packet.c:650)
==16247==    by 0x69ACDB5: call_dissector_work (packet.c:725)
==16247==    by 0x69ACC7E: dissector_try_uint_new (packet.c:1290)
==16247==    by 0x718EB6F: decode_tcp_ports (packet-tcp.c:5420)
==16247==    by 0x718FE8F: process_tcp_payload (packet-tcp.c:5483)
==16247==    by 0x718F3E8: desegment_tcp (packet-tcp.c:2990)
==16247==    by 0x718F3E8: dissect_tcp_payload (packet-tcp.c:5550)
==16247==    by 0x7193E57: dissect_tcp (packet-tcp.c:6434)
==16247==    by 0x69ACDB5: call_dissector_through_handle (packet.c:650)
==16247==    by 0x69ACDB5: call_dissector_work (packet.c:725)
==16247==    by 0x69ACC7E: dissector_try_uint_new (packet.c:1290)
==16247==    by 0x6DDD922: ip_try_dissect (packet-ip.c:1978)
==16247==    by 0x6DDD922: dissect_ip_v4 (packet-ip.c:2441)
==16247== 
==16247== 
==16247== HEAP SUMMARY:
==16247==     in use at exit: 6,085,520 bytes in 9,731 blocks
==16247==   total heap usage: 266,061 allocs, 256,330 frees, 37,344,896 bytes
allocated
==16247== 
==16247== LEAK SUMMARY:
==16247==    definitely lost: 456 bytes in 90 blocks
==16247==    indirectly lost: 384 bytes in 3 blocks
==16247==      possibly lost: 0 bytes in 0 blocks
==16247==    still reachable: 6,084,680 bytes in 9,638 blocks
==16247==         suppressed: 0 bytes in 0 blocks
==16247== Rerun with --leak-check=full to see details of leaked memory
==16247== 
==16247== For counts of detected and suppressed errors, rerun with: -v
==16247== Use --track-origins=yes to see where uninitialised values come from
==16247== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)

[ no debug trace ]

-- 
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

Reply via email to