https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14500

            Bug ID: 14500
           Summary: Buildbot crash output: fuzz-2018-03-08-6590.pcap
           Product: Wireshark
           Version: unspecified
          Hardware: x86-64
                OS: Ubuntu
            Status: CONFIRMED
          Severity: Major
          Priority: High
         Component: Dissection engine (libwireshark)
          Assignee: bugzilla-ad...@wireshark.org
          Reporter: buildbot-do-not-re...@wireshark.org
  Target Milestone: ---

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2018-03-08-6590.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/0000.cap

Build host information:
Linux wsbb04 4.4.0-116-generic #140-Ubuntu SMP Mon Feb 12 21:23:04 UTC 2018
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description:    Ubuntu 16.04.4 LTS
Release:        16.04
Codename:       xenial

Buildbot information:
BUILDBOT_REPOSITORY=ssh://wireshark-build...@code.wireshark.org:29418/wireshark
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_BUILDNUMBER=4656
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_GOT_REVISION=39a65995ccaa45322b7ee870fe21a0daa6157242

Return value:  0

Dissector bug:  0

Valgrind error count:  6



Git commit
commit 39a65995ccaa45322b7ee870fe21a0daa6157242
Author: Gerald Combs <ger...@wireshark.org>
Date:   Wed Mar 7 11:35:33 2018 -0800

    CMake: Exclude test targets from the default build.

    For the Visual Studio generator, setting the EXCLUDE_FROM_ALL property on
    a target excludes it from ALL_BUILD.vcxproj, but we additionally need
    to set EXCLUDE_FROM_DEFAULT_BUILD to exclude it from Wireshark.sln.
    Do so for the test targets.

    Change-Id: Icd328f75d4927e5b7bb65b1833da4724f63476b6
    Reviewed-on: https://code.wireshark.org/review/26345
    Petri-Dish: Gerald Combs <ger...@wireshark.org>
    Tested-by: Petri Dish Buildbot
    Reviewed-by: Gerald Combs <ger...@wireshark.org>


==6632== Memcheck, a memory error detector
==6632== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==6632== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info
==6632== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2018-03-08-6590.pcap
==6632== 
==6632== Conditional jump or move depends on uninitialised value(s)
==6632==    at 0x4C30F78: strlen (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==6632==    by 0x7D87FC3: process_mmdbr_stdout (maxmind_db.c:134)
==6632==    by 0x7D889B0: mmdb_resolve_start (maxmind_db.c:261)
==6632==    by 0x7D87E13: maxmind_db_post_update_cb (maxmind_db.c:345)
==6632==    by 0x7E0D464: uat_load (uat_load.l:372)
==6632==    by 0x7DF6A2E: uat_load_all (uat.c:532)
==6632==    by 0x7DA3D6A: init_prefs (prefs.c:3961)
==6632==    by 0x7DA3DF1: read_prefs (prefs.c:4314)
==6632==    by 0x7D7ED61: epan_load_settings (epan.c:283)
==6632==    by 0x11A2B0: main (tshark.c:1016)
==6632== 
==6632== Conditional jump or move depends on uninitialised value(s)
==6632==    at 0x4C3548F: strstr (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==6632==    by 0xB8DAB77: g_strsplit (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4800.2)
==6632==    by 0x7D87FEC: process_mmdbr_stdout (maxmind_db.c:140)
==6632==    by 0x7D889B0: mmdb_resolve_start (maxmind_db.c:261)
==6632==    by 0x7D87E13: maxmind_db_post_update_cb (maxmind_db.c:345)
==6632==    by 0x7E0D464: uat_load (uat_load.l:372)
==6632==    by 0x7DF6A2E: uat_load_all (uat.c:532)
==6632==    by 0x7DA3D6A: init_prefs (prefs.c:3961)
==6632==    by 0x7DA3DF1: read_prefs (prefs.c:4314)
==6632==    by 0x7D7ED61: epan_load_settings (epan.c:283)
==6632==    by 0x11A2B0: main (tshark.c:1016)
==6632== 
==6632== Conditional jump or move depends on uninitialised value(s)
==6632==    at 0x4C30F69: strlen (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==6632==    by 0xB8D94E2: g_strdup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4800.2)
==6632==    by 0xB8DAC3E: g_strsplit (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4800.2)
==6632==    by 0x7D87FEC: process_mmdbr_stdout (maxmind_db.c:140)
==6632==    by 0x7D889B0: mmdb_resolve_start (maxmind_db.c:261)
==6632==    by 0x7D87E13: maxmind_db_post_update_cb (maxmind_db.c:345)
==6632==    by 0x7E0D464: uat_load (uat_load.l:372)
==6632==    by 0x7DF6A2E: uat_load_all (uat.c:532)
==6632==    by 0x7DA3D6A: init_prefs (prefs.c:3961)
==6632==    by 0x7DA3DF1: read_prefs (prefs.c:4314)
==6632==    by 0x7D7ED61: epan_load_settings (epan.c:283)
==6632==    by 0x11A2B0: main (tshark.c:1016)
==6632== 
==6632== Conditional jump or move depends on uninitialised value(s)
==6632==    at 0x4C30F69: strlen (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==6632==    by 0x7D8802C: process_mmdbr_stdout (maxmind_db.c:143)
==6632==    by 0x7D889B0: mmdb_resolve_start (maxmind_db.c:261)
==6632==    by 0x7D87E13: maxmind_db_post_update_cb (maxmind_db.c:345)
==6632==    by 0x7E0D464: uat_load (uat_load.l:372)
==6632==    by 0x7DF6A2E: uat_load_all (uat.c:532)
==6632==    by 0x7DA3D6A: init_prefs (prefs.c:3961)
==6632==    by 0x7DA3DF1: read_prefs (prefs.c:4314)
==6632==    by 0x7D7ED61: epan_load_settings (epan.c:283)
==6632==    by 0x11A2B0: main (tshark.c:1016)
==6632== 
==6632== Conditional jump or move depends on uninitialised value(s)
==6632==    at 0x4C30A0A: __GI_strchr (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==6632==    by 0x7D8803C: process_mmdbr_stdout (maxmind_db.c:144)
==6632==    by 0x7D889B0: mmdb_resolve_start (maxmind_db.c:261)
==6632==    by 0x7D87E13: maxmind_db_post_update_cb (maxmind_db.c:345)
==6632==    by 0x7E0D464: uat_load (uat_load.l:372)
==6632==    by 0x7DF6A2E: uat_load_all (uat.c:532)
==6632==    by 0x7DA3D6A: init_prefs (prefs.c:3961)
==6632==    by 0x7DA3DF1: read_prefs (prefs.c:4314)
==6632==    by 0x7D7ED61: epan_load_settings (epan.c:283)
==6632==    by 0x11A2B0: main (tshark.c:1016)
==6632== 
==6632== Conditional jump or move depends on uninitialised value(s)
==6632==    at 0x4C30A10: __GI_strchr (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==6632==    by 0x7D8803C: process_mmdbr_stdout (maxmind_db.c:144)
==6632==    by 0x7D889B0: mmdb_resolve_start (maxmind_db.c:261)
==6632==    by 0x7D87E13: maxmind_db_post_update_cb (maxmind_db.c:345)
==6632==    by 0x7E0D464: uat_load (uat_load.l:372)
==6632==    by 0x7DF6A2E: uat_load_all (uat.c:532)
==6632==    by 0x7DA3D6A: init_prefs (prefs.c:3961)
==6632==    by 0x7DA3DF1: read_prefs (prefs.c:4314)
==6632==    by 0x7D7ED61: epan_load_settings (epan.c:283)
==6632==    by 0x11A2B0: main (tshark.c:1016)
==6632== 
==6632== 
==6632== HEAP SUMMARY:
==6632==     in use at exit: 107,551 bytes in 138 blocks
==6632==   total heap usage: 332,076 allocs, 331,938 frees, 38,542,961 bytes
allocated
==6632== 
==6632== LEAK SUMMARY:
==6632==    definitely lost: 0 bytes in 0 blocks
==6632==    indirectly lost: 0 bytes in 0 blocks
==6632==      possibly lost: 0 bytes in 0 blocks
==6632==    still reachable: 12,956 bytes in 95 blocks
==6632==         suppressed: 94,595 bytes in 43 blocks
==6632== Rerun with --leak-check=full to see details of leaked memory
==6632== 
==6632== For counts of detected and suppressed errors, rerun with: -v
==6632== Use --track-origins=yes to see where uninitialised values come from
==6632== ERROR SUMMARY: 6 errors from 6 contexts (suppressed: 0 from 0)

[ no debug trace ]

-- 
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

Reply via email to