ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
July 17th, 2024 | 10:00am-11:55am SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 10108] New: Buildbot crash output: fuzz-2014-05-14-27030.p

Date: Thu, 15 May 2014 10:40:04 +0000
Bug ID 10108
Summary Buildbot crash output: fuzz-2014-05-14-27030.pcap
Classification Unclassified
Product Wireshark
Version unspecified
Hardware x86-64
URL http://www.wireshark.org/download/automated/captures/fuzz-2014-05-14-27030.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Problems have been found with the following capture file:

http://www.wireshark.org/download/automated/captures/fuzz-2014-05-14-27030.pcap

stderr:
Input file:
/home/wireshark/menagerie/menagerie/10648-dcp_split_00004_20130424095731

Build host information:
Linux wsbb04 3.2.0-61-generic #93-Ubuntu SMP Fri May 2 21:31:50 UTC 2014 x86_64
x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 12.04.4 LTS
Release:    12.04
Codename:    precise

Buildbot information:
BUILDBOT_REPOSITORY=
BUILDBOT_BUILDNUMBER=454
BUILDBOT_URL=http://buildbot.wireshark.org/trunk-1.10/
BUILDBOT_BUILDERNAME=Fuzz-Test
BUILDBOT_SLAVENAME=fuzz-test
BUILDBOT_GOT_REVISION=6a77ad9ea439cb0d3d212a345f9c3cac30e084d4

Return value:  134

Dissector bug:  0

Valgrind error count:  0



Git commit
commit 6a77ad9ea439cb0d3d212a345f9c3cac30e084d4
Author: Jeff Morriss <[email protected]>
Date:   Tue Apr 22 22:18:35 2014 -0400

    Manually apply https://code.wireshark.org/review/1289 to master-1.10:

    Fix up get_hfi_and_length():

    Treat FT_BYTES and a few others the same as FT_PROTOCOL: allow a zero
length
    but throw an exception if the offset is already beyond the end of the TVB
    (prior to this change it would assert out).  This (when manually applied to
    master-1.10) fixes https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9999
.

    Use tvb_ensure_captured_length_remaining() to throw an exception if the
offset
    is bad.

    Change-Id: Ibc61cc9ac331b669c688611ee9f23d36479378ef
    Reviewed-on: https://code.wireshark.org/review/1290
    Reviewed-by: Alexis La Goutte <[email protected]>
    Reviewed-by: Evan Huus <[email protected]>


Command and args: ./tshark -nVxr

Out Of Memory!

Sorry, but TShark has to terminate now!

Some infos / workarounds can be found at:
http://wiki.wireshark.org/KnownBugs/OutOfMemory
**
ERROR:wmem_scopes.c:125:wmem_leave_file_scope: assertion failed:
(!in_packet_scope)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.