https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13660
Bug ID: 13660
Summary: Buildbot crash output: fuzz-2017-04-25-3107.pcap
Product: Wireshark
Version: unspecified
Hardware: x86-64
URL: https://www.wireshark.org/download/automated/captures/
fuzz-2017-04-25-3107.pcap
OS: Ubuntu
Status: CONFIRMED
Severity: Major
Priority: High
Component: Dissection engine (libwireshark)
Assignee: bugzilla-ad...@wireshark.org
Reporter: buildbot-do-not-re...@wireshark.org
Target Milestone: ---
Problems have been found with the following capture file:
https://www.wireshark.org/download/automated/captures/fuzz-2017-04-25-3107.pcap
stderr:
Input file: /home/wireshark/menagerie/menagerie/0000.cap
Build host information:
Linux wsbb04 4.4.0-72-generic #93-Ubuntu SMP Fri Mar 31 14:07:41 UTC 2017
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description: Ubuntu 16.04.2 LTS
Release: 16.04
Codename: xenial
Buildbot information:
BUILDBOT_REPOSITORY=ssh://wireshark-build...@code.wireshark.org:29418/wireshark
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_BUILDNUMBER=4000
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_GOT_REVISION=77751c94f17e2c110ae9e88b1780e279d610b96b
Return value: 0
Dissector bug: 0
Valgrind error count: 1
Git commit
commit 77751c94f17e2c110ae9e88b1780e279d610b96b
Author: Stig Bjørlykke <s...@bjorlykke.org>
Date: Sat Apr 15 23:30:30 2017 +0200
Qt: Add interface toolbar support
An extcap utility can provide configuration for controls to use in a
GUI interface toolbar. This controls are bidirectional and can be
used to control the extcap utility while capturing.
This is useful in scenarios where configuration can be done based on
findings in the capture process, setting temporary values or give other
inputs without restarting current capture.
Todo:
- Add support for Windows
Change-Id: Ie15fa67f92eb27d8b73df6bb36f66b9a7d81932d
Reviewed-on: https://code.wireshark.org/review/19982
Petri-Dish: Stig Bjørlykke <s...@bjorlykke.org>
Tested-by: Petri Dish Buildbot <buildbot-no-re...@wireshark.org>
Reviewed-by: Stig Bjørlykke <s...@bjorlykke.org>
==3230== Memcheck, a memory error detector
==3230== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==3230== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info
==3230== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2017-04-25-3107.pcap
==3230==
==3230== Invalid read of size 8
==3230== at 0x76DC44B: wmem_list_foreach (wmem_list.c:267)
==3230== by 0x6B3FCE5: bootp_cleanup_protocol (packet-bootp.c:6343)
==3230== by 0xA40309C: g_slist_foreach (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4800.2)
==3230== by 0x6A0B08A: cleanup_dissection (packet.c:343)
==3230== by 0x6A00E9D: epan_free (epan.c:337)
==3230== by 0x414CB1: main (tshark.c:2113)
==3230== Address 0x8 is not stack'd, malloc'd or (recently) free'd
==3230==
==3230==
==3230== Process terminating with default action of signal 11 (SIGSEGV):
dumping core
==3230== Access not within mapped region at address 0x8
==3230== at 0x76DC44B: wmem_list_foreach (wmem_list.c:267)
==3230== by 0x6B3FCE5: bootp_cleanup_protocol (packet-bootp.c:6343)
==3230== by 0xA40309C: g_slist_foreach (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4800.2)
==3230== by 0x6A0B08A: cleanup_dissection (packet.c:343)
==3230== by 0x6A00E9D: epan_free (epan.c:337)
==3230== by 0x414CB1: main (tshark.c:2113)
==3230== If you believe this happened as a result of a stack
==3230== overflow in your program's main thread (unlikely but
==3230== possible), you can try to increase the size of the
==3230== main thread stack using the --main-stacksize= flag.
==3230== The main thread stack size used in this run was 2084864.
==3230==
==3230== HEAP SUMMARY:
==3230== in use at exit: 25,770,290 bytes in 222,272 blocks
==3230== total heap usage: 278,123 allocs, 55,851 frees, 37,831,329 bytes
allocated
==3230==
==3230== LEAK SUMMARY:
==3230== definitely lost: 36 bytes in 2 blocks
==3230== indirectly lost: 72 bytes in 3 blocks
==3230== possibly lost: 0 bytes in 0 blocks
==3230== still reachable: 25,552,879 bytes in 221,463 blocks
==3230== suppressed: 217,303 bytes in 804 blocks
==3230== Rerun with --leak-check=full to see details of leaked memory
==3230==
==3230== For counts of detected and suppressed errors, rerun with: -v
==3230== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
./tools/valgrind-wireshark.sh: line 149: 3230 Segmentation fault (core
dumped) $cmdline > /dev/null
[ no debug trace ]
--
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via: Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives: https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe