https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16648
Bug ID: 16648
Summary: Buildbot crash output: fuzz-2020-06-21-30831.pcap
Product: Wireshark
Version: unspecified
Hardware: x86-64
OS: Ubuntu
Status: CONFIRMED
Severity: Major
Priority: High
Component: Dissection engine (libwireshark)
Assignee: bugzilla-ad...@wireshark.org
Reporter: buildbot-do-not-re...@wireshark.org
Target Milestone: ---
Problems have been found with the following capture file:
https://www.wireshark.org/download/automated/captures/fuzz-2020-06-21-30831.pcap
stderr:
Input file: /home/wireshark/menagerie/menagerie/16666-reassembly.pcapng
Build host information:
Linux build6 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description: Ubuntu 18.04.4 LTS
Release: 18.04
Codename: bionic
Buildbot information:
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_BUILDNUMBER=5237
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_REPOSITORY=ssh://wireshark-build...@code.wireshark.org:29418/wireshark
BUILDBOT_GOT_REVISION=f97e20a011144a56bf72dd92c49167d17713a909
Return value: 0
Dissector bug: 0
Valgrind error count: 5
Git commit
commit f97e20a011144a56bf72dd92c49167d17713a909
Author: Guy Harris <ghar...@sonic.net>
Date: Sun Jun 21 12:01:07 2020 -0700
RTPS: don't use incompletely filled in GUIDs.
Add to the GUID type a bitmask that indicates which fields have been
filled in; start it out as 0, and then set bits in it as fields get
filled in.
Do not add a type mapping object to the hash table unless the GUID is
completely filled in, and don't look for a type mapping object in the
hash table with a GUID that hasn't been completely filled in as a key.
Bug: 16642
Change-Id: I31db92238adcb2ec2d70b2650e41b14d99001908
Reviewed-on: https://code.wireshark.org/review/37537
Petri-Dish: Guy Harris <ghar...@sonic.net>
Tested-by: Petri Dish Buildbot
Reviewed-by: Guy Harris <ghar...@sonic.net>
Command and args: ./tools/valgrind-wireshark.sh -b
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin
==16544== Memcheck, a memory error detector
==16544== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==16544== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info
==16544== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2020-06-21-30831.pcap
==16544==
==16544== Use of uninitialised value of size 8
==16544== at 0x83402F7: wmem_map_insert (wmem_map.c:201)
==16544== by 0x7762457: rtps_util_add_type_library_element
(packet-rtps.c:4041)
==16544== by 0x7761F3B: rtps_util_add_type_library (packet-rtps.c:4054)
==16544== by 0x77618B7: rtps_util_add_typeobject (packet-rtps.c:4074)
==16544== by 0x775F06B: dissect_parameter_sequence_rti_dds
(packet-rtps.c:5275)
==16544== by 0x775B501: dissect_parameter_sequence (packet-rtps.c:6881)
==16544== by 0x776419C: dissect_serialized_data (packet-rtps.c:7175)
==16544== by 0x7767F8F: dissect_RTPS_DATA (packet-rtps.c:9125)
==16544== by 0x7758EAA: dissect_rtps_submessage_v2 (packet-rtps.c:10255)
==16544== by 0x7758609: dissect_rtps (packet-rtps.c:10585)
==16544== by 0x7757B72: dissect_rtps_udp (packet-rtps.c:10610)
==16544== by 0x83AE392: dissector_try_heuristic (packet.c:2815)
==16544==
==16544== Use of uninitialised value of size 8
==16544== at 0x8340377: wmem_map_insert (wmem_map.c:212)
==16544== by 0x7762457: rtps_util_add_type_library_element
(packet-rtps.c:4041)
==16544== by 0x7761F3B: rtps_util_add_type_library (packet-rtps.c:4054)
==16544== by 0x77618B7: rtps_util_add_typeobject (packet-rtps.c:4074)
==16544== by 0x775F06B: dissect_parameter_sequence_rti_dds
(packet-rtps.c:5275)
==16544== by 0x775B501: dissect_parameter_sequence (packet-rtps.c:6881)
==16544== by 0x776419C: dissect_serialized_data (packet-rtps.c:7175)
==16544== by 0x7767F8F: dissect_RTPS_DATA (packet-rtps.c:9125)
==16544== by 0x7758EAA: dissect_rtps_submessage_v2 (packet-rtps.c:10255)
==16544== by 0x7758609: dissect_rtps (packet-rtps.c:10585)
==16544== by 0x7757B72: dissect_rtps_udp (packet-rtps.c:10610)
==16544== by 0x83AE392: dissector_try_heuristic (packet.c:2815)
==16544==
==16544== Use of uninitialised value of size 8
==16544== at 0x8340382: wmem_map_insert (wmem_map.c:214)
==16544== by 0x7762457: rtps_util_add_type_library_element
(packet-rtps.c:4041)
==16544== by 0x7761F3B: rtps_util_add_type_library (packet-rtps.c:4054)
==16544== by 0x77618B7: rtps_util_add_typeobject (packet-rtps.c:4074)
==16544== by 0x775F06B: dissect_parameter_sequence_rti_dds
(packet-rtps.c:5275)
==16544== by 0x775B501: dissect_parameter_sequence (packet-rtps.c:6881)
==16544== by 0x776419C: dissect_serialized_data (packet-rtps.c:7175)
==16544== by 0x7767F8F: dissect_RTPS_DATA (packet-rtps.c:9125)
==16544== by 0x7758EAA: dissect_rtps_submessage_v2 (packet-rtps.c:10255)
==16544== by 0x7758609: dissect_rtps (packet-rtps.c:10585)
==16544== by 0x7757B72: dissect_rtps_udp (packet-rtps.c:10610)
==16544== by 0x83AE392: dissector_try_heuristic (packet.c:2815)
==16544==
==16544== Use of uninitialised value of size 8
==16544== at 0x8340390: wmem_map_insert (wmem_map.c:215)
==16544== by 0x7762457: rtps_util_add_type_library_element
(packet-rtps.c:4041)
==16544== by 0x7761F3B: rtps_util_add_type_library (packet-rtps.c:4054)
==16544== by 0x77618B7: rtps_util_add_typeobject (packet-rtps.c:4074)
==16544== by 0x775F06B: dissect_parameter_sequence_rti_dds
(packet-rtps.c:5275)
==16544== by 0x775B501: dissect_parameter_sequence (packet-rtps.c:6881)
==16544== by 0x776419C: dissect_serialized_data (packet-rtps.c:7175)
==16544== by 0x7767F8F: dissect_RTPS_DATA (packet-rtps.c:9125)
==16544== by 0x7758EAA: dissect_rtps_submessage_v2 (packet-rtps.c:10255)
==16544== by 0x7758609: dissect_rtps (packet-rtps.c:10585)
==16544== by 0x7757B72: dissect_rtps_udp (packet-rtps.c:10610)
==16544== by 0x83AE392: dissector_try_heuristic (packet.c:2815)
==16544==
==16544== Use of uninitialised value of size 8
==16544== at 0x834039B: wmem_map_insert (wmem_map.c:216)
==16544== by 0x7762457: rtps_util_add_type_library_element
(packet-rtps.c:4041)
==16544== by 0x7761F3B: rtps_util_add_type_library (packet-rtps.c:4054)
==16544== by 0x77618B7: rtps_util_add_typeobject (packet-rtps.c:4074)
==16544== by 0x775F06B: dissect_parameter_sequence_rti_dds
(packet-rtps.c:5275)
==16544== by 0x775B501: dissect_parameter_sequence (packet-rtps.c:6881)
==16544== by 0x776419C: dissect_serialized_data (packet-rtps.c:7175)
==16544== by 0x7767F8F: dissect_RTPS_DATA (packet-rtps.c:9125)
==16544== by 0x7758EAA: dissect_rtps_submessage_v2 (packet-rtps.c:10255)
==16544== by 0x7758609: dissect_rtps (packet-rtps.c:10585)
==16544== by 0x7757B72: dissect_rtps_udp (packet-rtps.c:10610)
==16544== by 0x83AE392: dissector_try_heuristic (packet.c:2815)
==16544==
==16544==
==16544== HEAP SUMMARY:
==16544== in use at exit: 43,319 bytes in 204 blocks
==16544== total heap usage: 370,523 allocs, 370,319 frees, 42,029,375 bytes
allocated
==16544==
==16544== LEAK SUMMARY:
==16544== definitely lost: 0 bytes in 0 blocks
==16544== indirectly lost: 0 bytes in 0 blocks
==16544== possibly lost: 304 bytes in 1 blocks
==16544== still reachable: 42,212 bytes in 170 blocks
==16544== suppressed: 803 bytes in 33 blocks
==16544== Rerun with --leak-check=full to see details of leaked memory
==16544==
==16544== For counts of detected and suppressed errors, rerun with: -v
==16544== Use --track-origins=yes to see where uninitialised values come from
==16544== ERROR SUMMARY: 5 errors from 5 contexts (suppressed: 0 from 0)
[ no debug trace ]
--
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via: Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives: https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe