Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 11781] New: Buildbot crash output: fuzz-2015-11-26-20469.p

Date: Thu, 26 Nov 2015 01:50:03 +0000
Bug ID 11781
Summary Buildbot crash output: fuzz-2015-11-26-20469.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2015-11-26-20469.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2015-11-26-20469.pcap

stderr:
Input file:
/home/wireshark/menagerie/menagerie/1147-fuzz-2007-11-16-18765.pcap.gz

Build host information:
Linux wsbb04 3.13.0-66-generic #108-Ubuntu SMP Wed Oct 7 15:20:27 UTC 2015
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 14.04.3 LTS
Release:    14.04
Codename:    trusty

Buildbot information:
BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark
BUILDBOT_BUILDNUMBER=3407
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=723756bfd7a368feb6f60409fbc0992f7efd4827

Return value:  139

Dissector bug:  0

Valgrind error count:  0



Git commit
commit 723756bfd7a368feb6f60409fbc0992f7efd4827
Author: John A. Thacker <[email protected]>
Date:   Wed Nov 25 11:07:26 2015 -0500

    PPP: RTP IPHC Compressed Non TCP packets and D bit zero packets (RFC 2507)

    Add support for RFC 2507 style IP Header Compression Compressed Non TCP
packets
    (PPP protocol 0x0065). Also support RTP IPHC Full Header packets (protocol
    0x0061) where the D bit is unset. Add expert info for when the D bit is
unset
    but the sequence number is nonzero.

    Also fix an existing typo where the CUDP16 handle was being called for the
    CUDP8 "ethertype" for NDISWAN (very rare.)

    Bug: 11776
    Change-Id: I9a7adcc5fdd4ee49bb75724142684043bd664111
    Reviewed-on: https://code.wireshark.org/review/12143
    Petri-Dish: Michael Mann <[email protected]>
    Reviewed-by: Michael Mann <[email protected]>


Command and args:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark
-nVxr


[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.