Wireshark-bugs: [Wireshark-bugs] [Bug 13226] New: Buildbot crash output: fuzz-2016-12-08-5712.pc
Bug ID |
13226
|
Summary |
Buildbot crash output: fuzz-2016-12-08-5712.pcap
|
Product |
Wireshark
|
Version |
unspecified
|
Hardware |
x86-64
|
URL |
https://www.wireshark.org/download/automated/captures/fuzz-2016-12-08-5712.pcap
|
OS |
Ubuntu
|
Status |
CONFIRMED
|
Severity |
Major
|
Priority |
High
|
Component |
Dissection engine (libwireshark)
|
Assignee |
bugzilla-admin@wireshark.org
|
Reporter |
buildbot-do-not-reply@wireshark.org
|
Problems have been found with the following capture file:
https://www.wireshark.org/download/automated/captures/fuzz-2016-12-08-5712.pcap
stderr:
Input file: /home/wireshark/menagerie/menagerie/SMB-locking.pcapng.gz
Build host information:
Linux wsbb04 4.4.0-47-generic #68-Ubuntu SMP Wed Oct 26 19:39:52 UTC 2016
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description: Ubuntu 16.04.1 LTS
Release: 16.04
Codename: xenial
Buildbot information:
BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_BUILDNUMBER=3814
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_GOT_REVISION=3496051d07683a5ddee435c7dc521a157b142fa3
Return value: 0
Dissector bug: 0
Valgrind error count: 1
Git commit
commit 3496051d07683a5ddee435c7dc521a157b142fa3
Author: Peter Wu <peter@lekensteyn.nl>
Date: Thu Dec 8 00:24:05 2016 +0100
sdp: decode pt for more RTP transport protocols
Do not just decode the payload type for RTP/AVP, but also all RTP
transport types.
Add RTP/AVPF (same as normal RTP/AVP, but with additional RTCP formats).
Similarly, add RTP/SAVPF and the two DTLS variants. Add references to
the relevant specifications and order per IANA registry.
Tested with dtls-srtp-ws-sip.pcapng, now the payload types under the
"m=" tree have names and frames that were previously reported as RTP
show up as SRTP. Frame 442 now shows "Encrypted RTCP Payload" warning
instead of decoding it as garbage.
Change-Id: I06893f385ec270391f8891e72a364d08d2354a0a
Ping-Bug: 13193
Reviewed-on: https://code.wireshark.org/review/19139
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
==21462== Memcheck, a memory error detector
==21462== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==21462== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info
==21462== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark
-Vx -nr
/fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2016-12-08-5712.pcap
==21462==
==21462==
==21462== Process terminating with default action of signal 24 (SIGXCPU):
dumping core
==21462== at 0x69C3420: print_line_text (print_stream.c:134)
==21462== by 0x69BF69F: proto_tree_print_node (print.c:189)
==21462== by 0x69C48B9: proto_tree_children_foreach (proto.c:697)
==21462== by 0x69BF78D: proto_tree_print_node (print.c:238)
==21462== by 0x69C48B9: proto_tree_children_foreach (proto.c:697)
==21462== by 0x69BF78D: proto_tree_print_node (print.c:238)
==21462== by 0x69C48B9: proto_tree_children_foreach (proto.c:697)
==21462== by 0x69BF5F4: proto_tree_print (print.c:152)
==21462== by 0x416F60: print_packet (tshark.c:3891)
==21462== by 0x416389: process_packet (tshark.c:3492)
==21462== by 0x4140D1: load_cap_file (tshark.c:3234)
==21462== by 0x4140D1: main (tshark.c:1934)
==21462==
==21462== HEAP SUMMARY:
==21462== in use at exit: 124,126,434 bytes in 1,778,497 blocks
==21462== total heap usage: 71,481,591 allocs, 69,703,094 frees,
6,041,772,320 bytes allocated
==21462==
==21462== LEAK SUMMARY:
==21462== definitely lost: 344 bytes in 86 blocks
==21462== indirectly lost: 0 bytes in 0 blocks
==21462== possibly lost: 0 bytes in 0 blocks
==21462== still reachable: 124,126,090 bytes in 1,778,411 blocks
==21462== of which reachable via heuristic:
==21462== multipleinheritance: 699,520 bytes in 143
blocks
==21462== suppressed: 0 bytes in 0 blocks
==21462== Rerun with --leak-check=full to see details of leaked memory
==21462==
==21462== For counts of detected and suppressed errors, rerun with: -v
==21462== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
./tools/valgrind-wireshark.sh: line 123: 21462 CPU time limit exceeded (core
dumped) $cmdline > /dev/null
[ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.