Wireshark-bugs: [Wireshark-bugs] [Bug 13226] New: Buildbot crash output: fuzz-2016-12-08-5712.pc
Date: Fri, 09 Dec 2016 19:10:07 +0000
Bug ID 13226
Summary Buildbot crash output: fuzz-2016-12-08-5712.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2016-12-08-5712.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee bugzilla-admin@wireshark.org
Reporter buildbot-do-not-reply@wireshark.org

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2016-12-08-5712.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/SMB-locking.pcapng.gz

Build host information:
Linux wsbb04 4.4.0-47-generic #68-Ubuntu SMP Wed Oct 26 19:39:52 UTC 2016
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 16.04.1 LTS
Release:    16.04
Codename:    xenial

Buildbot information:
BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_BUILDNUMBER=3814
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_GOT_REVISION=3496051d07683a5ddee435c7dc521a157b142fa3

Return value:  0

Dissector bug:  0

Valgrind error count:  1



Git commit
commit 3496051d07683a5ddee435c7dc521a157b142fa3
Author: Peter Wu <peter@lekensteyn.nl>
Date:   Thu Dec 8 00:24:05 2016 +0100

    sdp: decode pt for more RTP transport protocols

    Do not just decode the payload type for RTP/AVP, but also all RTP
    transport types.

    Add RTP/AVPF (same as normal RTP/AVP, but with additional RTCP formats).
    Similarly, add RTP/SAVPF and the two DTLS variants. Add references to
    the relevant specifications and order per IANA registry.

    Tested with dtls-srtp-ws-sip.pcapng, now the payload types under the
    "m=" tree have names and frames that were previously reported as RTP
    show up as SRTP. Frame 442 now shows "Encrypted RTCP Payload" warning
    instead of decoding it as garbage.

    Change-Id: I06893f385ec270391f8891e72a364d08d2354a0a
    Ping-Bug: 13193
    Reviewed-on: https://code.wireshark.org/review/19139
    Petri-Dish: Anders Broman <a.broman58@gmail.com>
    Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
    Reviewed-by: Anders Broman <a.broman58@gmail.com>


==21462== Memcheck, a memory error detector
==21462== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==21462== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info
==21462== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark
-Vx -nr
/fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2016-12-08-5712.pcap
==21462== 
==21462== 
==21462== Process terminating with default action of signal 24 (SIGXCPU):
dumping core
==21462==    at 0x69C3420: print_line_text (print_stream.c:134)
==21462==    by 0x69BF69F: proto_tree_print_node (print.c:189)
==21462==    by 0x69C48B9: proto_tree_children_foreach (proto.c:697)
==21462==    by 0x69BF78D: proto_tree_print_node (print.c:238)
==21462==    by 0x69C48B9: proto_tree_children_foreach (proto.c:697)
==21462==    by 0x69BF78D: proto_tree_print_node (print.c:238)
==21462==    by 0x69C48B9: proto_tree_children_foreach (proto.c:697)
==21462==    by 0x69BF5F4: proto_tree_print (print.c:152)
==21462==    by 0x416F60: print_packet (tshark.c:3891)
==21462==    by 0x416389: process_packet (tshark.c:3492)
==21462==    by 0x4140D1: load_cap_file (tshark.c:3234)
==21462==    by 0x4140D1: main (tshark.c:1934)
==21462== 
==21462== HEAP SUMMARY:
==21462==     in use at exit: 124,126,434 bytes in 1,778,497 blocks
==21462==   total heap usage: 71,481,591 allocs, 69,703,094 frees,
6,041,772,320 bytes allocated
==21462== 
==21462== LEAK SUMMARY:
==21462==    definitely lost: 344 bytes in 86 blocks
==21462==    indirectly lost: 0 bytes in 0 blocks
==21462==      possibly lost: 0 bytes in 0 blocks
==21462==    still reachable: 124,126,090 bytes in 1,778,411 blocks
==21462==                       of which reachable via heuristic:
==21462==                         multipleinheritance: 699,520 bytes in 143
blocks
==21462==         suppressed: 0 bytes in 0 blocks
==21462== Rerun with --leak-check=full to see details of leaked memory
==21462== 
==21462== For counts of detected and suppressed errors, rerun with: -v
==21462== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
./tools/valgrind-wireshark.sh: line 123: 21462 CPU time limit exceeded (core
dumped) $cmdline > /dev/null

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.