https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16648

            Bug ID: 16648
           Summary: Buildbot crash output: fuzz-2020-06-21-30831.pcap
           Product: Wireshark
           Version: unspecified
          Hardware: x86-64
                OS: Ubuntu
            Status: CONFIRMED
          Severity: Major
          Priority: High
         Component: Dissection engine (libwireshark)
          Assignee: bugzilla-ad...@wireshark.org
          Reporter: buildbot-do-not-re...@wireshark.org
  Target Milestone: ---

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2020-06-21-30831.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/16666-reassembly.pcapng

Build host information:
Linux build6 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description:    Ubuntu 18.04.4 LTS
Release:        18.04
Codename:       bionic

Buildbot information:
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_BUILDNUMBER=5237
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_REPOSITORY=ssh://wireshark-build...@code.wireshark.org:29418/wireshark
BUILDBOT_GOT_REVISION=f97e20a011144a56bf72dd92c49167d17713a909

Return value:  0

Dissector bug:  0

Valgrind error count:  5



Git commit
commit f97e20a011144a56bf72dd92c49167d17713a909
Author: Guy Harris <ghar...@sonic.net>
Date:   Sun Jun 21 12:01:07 2020 -0700

    RTPS: don't use incompletely filled in GUIDs.

    Add to the GUID type a bitmask that indicates which fields have been
    filled in; start it out as 0, and then set bits in it as fields get
    filled in.

    Do not add a type mapping object to the hash table unless the GUID is
    completely filled in, and don't look for a type mapping object in the
    hash table with a GUID that hasn't been completely filled in as a key.

    Bug: 16642
    Change-Id: I31db92238adcb2ec2d70b2650e41b14d99001908
    Reviewed-on: https://code.wireshark.org/review/37537
    Petri-Dish: Guy Harris <ghar...@sonic.net>
    Tested-by: Petri Dish Buildbot
    Reviewed-by: Guy Harris <ghar...@sonic.net>


Command and args: ./tools/valgrind-wireshark.sh -b
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin
 
==16544== Memcheck, a memory error detector
==16544== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==16544== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info
==16544== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2020-06-21-30831.pcap
==16544== 
==16544== Use of uninitialised value of size 8
==16544==    at 0x83402F7: wmem_map_insert (wmem_map.c:201)
==16544==    by 0x7762457: rtps_util_add_type_library_element
(packet-rtps.c:4041)
==16544==    by 0x7761F3B: rtps_util_add_type_library (packet-rtps.c:4054)
==16544==    by 0x77618B7: rtps_util_add_typeobject (packet-rtps.c:4074)
==16544==    by 0x775F06B: dissect_parameter_sequence_rti_dds
(packet-rtps.c:5275)
==16544==    by 0x775B501: dissect_parameter_sequence (packet-rtps.c:6881)
==16544==    by 0x776419C: dissect_serialized_data (packet-rtps.c:7175)
==16544==    by 0x7767F8F: dissect_RTPS_DATA (packet-rtps.c:9125)
==16544==    by 0x7758EAA: dissect_rtps_submessage_v2 (packet-rtps.c:10255)
==16544==    by 0x7758609: dissect_rtps (packet-rtps.c:10585)
==16544==    by 0x7757B72: dissect_rtps_udp (packet-rtps.c:10610)
==16544==    by 0x83AE392: dissector_try_heuristic (packet.c:2815)
==16544== 
==16544== Use of uninitialised value of size 8
==16544==    at 0x8340377: wmem_map_insert (wmem_map.c:212)
==16544==    by 0x7762457: rtps_util_add_type_library_element
(packet-rtps.c:4041)
==16544==    by 0x7761F3B: rtps_util_add_type_library (packet-rtps.c:4054)
==16544==    by 0x77618B7: rtps_util_add_typeobject (packet-rtps.c:4074)
==16544==    by 0x775F06B: dissect_parameter_sequence_rti_dds
(packet-rtps.c:5275)
==16544==    by 0x775B501: dissect_parameter_sequence (packet-rtps.c:6881)
==16544==    by 0x776419C: dissect_serialized_data (packet-rtps.c:7175)
==16544==    by 0x7767F8F: dissect_RTPS_DATA (packet-rtps.c:9125)
==16544==    by 0x7758EAA: dissect_rtps_submessage_v2 (packet-rtps.c:10255)
==16544==    by 0x7758609: dissect_rtps (packet-rtps.c:10585)
==16544==    by 0x7757B72: dissect_rtps_udp (packet-rtps.c:10610)
==16544==    by 0x83AE392: dissector_try_heuristic (packet.c:2815)
==16544== 
==16544== Use of uninitialised value of size 8
==16544==    at 0x8340382: wmem_map_insert (wmem_map.c:214)
==16544==    by 0x7762457: rtps_util_add_type_library_element
(packet-rtps.c:4041)
==16544==    by 0x7761F3B: rtps_util_add_type_library (packet-rtps.c:4054)
==16544==    by 0x77618B7: rtps_util_add_typeobject (packet-rtps.c:4074)
==16544==    by 0x775F06B: dissect_parameter_sequence_rti_dds
(packet-rtps.c:5275)
==16544==    by 0x775B501: dissect_parameter_sequence (packet-rtps.c:6881)
==16544==    by 0x776419C: dissect_serialized_data (packet-rtps.c:7175)
==16544==    by 0x7767F8F: dissect_RTPS_DATA (packet-rtps.c:9125)
==16544==    by 0x7758EAA: dissect_rtps_submessage_v2 (packet-rtps.c:10255)
==16544==    by 0x7758609: dissect_rtps (packet-rtps.c:10585)
==16544==    by 0x7757B72: dissect_rtps_udp (packet-rtps.c:10610)
==16544==    by 0x83AE392: dissector_try_heuristic (packet.c:2815)
==16544== 
==16544== Use of uninitialised value of size 8
==16544==    at 0x8340390: wmem_map_insert (wmem_map.c:215)
==16544==    by 0x7762457: rtps_util_add_type_library_element
(packet-rtps.c:4041)
==16544==    by 0x7761F3B: rtps_util_add_type_library (packet-rtps.c:4054)
==16544==    by 0x77618B7: rtps_util_add_typeobject (packet-rtps.c:4074)
==16544==    by 0x775F06B: dissect_parameter_sequence_rti_dds
(packet-rtps.c:5275)
==16544==    by 0x775B501: dissect_parameter_sequence (packet-rtps.c:6881)
==16544==    by 0x776419C: dissect_serialized_data (packet-rtps.c:7175)
==16544==    by 0x7767F8F: dissect_RTPS_DATA (packet-rtps.c:9125)
==16544==    by 0x7758EAA: dissect_rtps_submessage_v2 (packet-rtps.c:10255)
==16544==    by 0x7758609: dissect_rtps (packet-rtps.c:10585)
==16544==    by 0x7757B72: dissect_rtps_udp (packet-rtps.c:10610)
==16544==    by 0x83AE392: dissector_try_heuristic (packet.c:2815)
==16544== 
==16544== Use of uninitialised value of size 8
==16544==    at 0x834039B: wmem_map_insert (wmem_map.c:216)
==16544==    by 0x7762457: rtps_util_add_type_library_element
(packet-rtps.c:4041)
==16544==    by 0x7761F3B: rtps_util_add_type_library (packet-rtps.c:4054)
==16544==    by 0x77618B7: rtps_util_add_typeobject (packet-rtps.c:4074)
==16544==    by 0x775F06B: dissect_parameter_sequence_rti_dds
(packet-rtps.c:5275)
==16544==    by 0x775B501: dissect_parameter_sequence (packet-rtps.c:6881)
==16544==    by 0x776419C: dissect_serialized_data (packet-rtps.c:7175)
==16544==    by 0x7767F8F: dissect_RTPS_DATA (packet-rtps.c:9125)
==16544==    by 0x7758EAA: dissect_rtps_submessage_v2 (packet-rtps.c:10255)
==16544==    by 0x7758609: dissect_rtps (packet-rtps.c:10585)
==16544==    by 0x7757B72: dissect_rtps_udp (packet-rtps.c:10610)
==16544==    by 0x83AE392: dissector_try_heuristic (packet.c:2815)
==16544== 
==16544== 
==16544== HEAP SUMMARY:
==16544==     in use at exit: 43,319 bytes in 204 blocks
==16544==   total heap usage: 370,523 allocs, 370,319 frees, 42,029,375 bytes
allocated
==16544== 
==16544== LEAK SUMMARY:
==16544==    definitely lost: 0 bytes in 0 blocks
==16544==    indirectly lost: 0 bytes in 0 blocks
==16544==      possibly lost: 304 bytes in 1 blocks
==16544==    still reachable: 42,212 bytes in 170 blocks
==16544==         suppressed: 803 bytes in 33 blocks
==16544== Rerun with --leak-check=full to see details of leaked memory
==16544== 
==16544== For counts of detected and suppressed errors, rerun with: -v
==16544== Use --track-origins=yes to see where uninitialised values come from
==16544== ERROR SUMMARY: 5 errors from 5 contexts (suppressed: 0 from 0)

[ no debug trace ]

-- 
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

Reply via email to