Fuzz job crash output: fuzz-2023-05-13-7062.pcap
Problems have been found with the following capture file:
https://www.wireshark.org/download/automated/captures/fuzz-2023-05-13-7062.pcap.gz
stderr:
Branch: release-4.0
Input file: /var/menagerie/menagerie/ultimate_wireshark_protocols_pcap_220213.pcap
CI job name: ASan Menagerie Fuzz, ID: 4280378212
CI job URL: https://gitlab.com/wireshark/wireshark/-/jobs/4280378212
Return value: 0
Dissector bug: 0
Date and time: Sat May 13 21:03:22 UTC 2023
Commits in the last 48 hours:
b1d3523e17 media_type: Register dissector table as case-insensitive
Build host information:
Linux 5.19.0-38-generic #39~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Mar 17 21:16:15 UTC 2 x86_64
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
Command and args: /builds/wireshark/wireshark/_install/bin/tshark -2 -nVxr
Running as user "root" and group "root". This could be dangerous.
** (tshark:35361) 20:53:24.160732 [Epan WARNING] -- Dissector bug, protocol GSUP, in packet 3843: epan/dissectors/packet-gsm_gsup.c:603: failed assertion "0"
** (tshark:35361) 20:53:25.894896 [Epan WARNING] -- Dissector bug, protocol TLS, in packet 9217: epan/dissectors/packet-tls.c:2257: failed assertion "frag_len != 0"
** (tshark:35361) 20:53:27.374344 [Epan WARNING] -- Dissector bug, protocol GNW, in packet 14307: epan/dissectors/packet-geonw.c:1263: failed assertion "!(tmp_val & 0xffffffff00000000)"
** (tshark:35361) 20:53:30.401611 [Epan WARNING] -- Dissector bug, protocol TPM2.0, in packet 24511: epan/dissectors/packet-tpm20.c:1050: failed assertion "command_entry != ((void*)0)"
fuzz-test.sh stderr:
Running as user "root" and group "root". This could be dangerous.
./tools/fuzz-test.sh: line 263: 35361 CPU time limit exceeded (core dumped) "$RUNNER" $COMMON_ARGS $ARGS "$TMP_DIR/$TMP_FILE" > /dev/null 2>> "$TMP_DIR/$ERR_FILE.$SUBSHELL_PID"
./tools/fuzz-test.sh: line 263: 35360 CPU time limit exceeded (core dumped) "$RUNNER" $COMMON_ARGS $ARGS "$TMP_DIR/$TMP_FILE" > /dev/null 2>> "$TMP_DIR/$ERR_FILE.$SUBSHELL_PID"
no debug trace