Wireshark-bugs: [Wireshark-bugs] [Bug 10776] New: Buildbot crash output: fuzz-2014-12-13-7456.pc
Date: Mon, 15 Dec 2014 07:40:05 +0000
Bug ID | 10776 |
---|---|
Summary | Buildbot crash output: fuzz-2014-12-13-7456.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2014-12-13-7456.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | bugzilla-admin@wireshark.org |
Reporter | buildbot-do-not-reply@wireshark.org |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2014-12-13-7456.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/9630-ATLAS_FTAM_TCP_TRACE_2012110713400115.pcap Build host information: Linux wsbb04 3.13.0-39-generic #66-Ubuntu SMP Tue Oct 28 13:30:27 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 14.04.1 LTS Release: 14.04 Codename: trusty Buildbot information: BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark BUILDBOT_BUILDNUMBER=3082 BUILDBOT_URL=http://buildbot.wireshark.org/trunk/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=bd4d291d1ba512521b16a863a7ad71690e7ad608 Return value: 0 Dissector bug: 0 Valgrind error count: 144 Git commit commit bd4d291d1ba512521b16a863a7ad71690e7ad608 Author: Alexis La Goutte <alexis.lagoutte@gmail.com> Date: Wed Nov 26 16:59:22 2014 +0100 Qt: Move Follow TCP, UDP, SSL to a Follow folder (like when right click) Change-Id: I24213aa4f9f134a05b1344e160e5688ce9c495cf Reviewed-on: https://code.wireshark.org/review/5508 Reviewed-by: Gerald Combs <gerald@wireshark.org> Command and args: ./tools/valgrind-wireshark.sh ==6680== Memcheck, a memory error detector ==6680== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==6680== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info ==6680== Command: /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2014-12-13-7456.pcap ==6680== ==6680== Invalid read of size 1 ==6680== at 0x9B1CFE0: g_str_hash (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==6680== by 0x9B1C568: g_hash_table_lookup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==6680== by 0x67BD4A0: call_ber_oid_callback (packet-ber.c:551) ==6680== by 0x67BC4D6: dissect_ber_choice (packet-ber.c:2925) ==6680== by 0x6EFC42F: dissect_acse_T_encoding (acse.cnf:129) ==6680== by 0x67BE0EC: dissect_ber_sequence (packet-ber.c:2425) ==6680== by 0x6EFC06F: dissect_acse_EXTERNALt_U (acse.cnf:147) ==6680== by 0x67BB60A: dissect_ber_tagged_type (packet-ber.c:717) ==6680== by 0x6EFBF3D: dissect_acse_EXTERNALt (acse.cnf:157) ==6680== by 0x67BFE76: dissect_ber_sq_of (packet-ber.c:3524) ==6680== by 0x67C062D: dissect_ber_sequence_of (packet-ber.c:3555) ==6680== by 0x6EFD0DF: dissect_acse_Association_data (acse.cnf:287) ==6680== Address 0x13e13970 is 0 bytes inside a block of size 35 free'd ==6680== at 0x4C2BDEC: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6680== by 0x66B4B64: emem_free_all (emem.c:1187) ==6680== by 0x66B5CD0: epan_dissect_run_with_taps (epan.c:350) ==6680== by 0x413713: process_packet (tshark.c:3531) ==6680== by 0x40C871: main (tshark.c:3317) ==6680== ==6680== Invalid read of size 1 ==6680== at 0x9B1CFFD: g_str_hash (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==6680== by 0x9B1C568: g_hash_table_lookup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==6680== by 0x67BD4A0: call_ber_oid_callback (packet-ber.c:551) ==6680== by 0x67BC4D6: dissect_ber_choice (packet-ber.c:2925) ==6680== by 0x6EFC42F: dissect_acse_T_encoding (acse.cnf:129) ==6680== by 0x67BE0EC: dissect_ber_sequence (packet-ber.c:2425) ==6680== by 0x6EFC06F: dissect_acse_EXTERNALt_U (acse.cnf:147) ==6680== by 0x67BB60A: dissect_ber_tagged_type (packet-ber.c:717) ==6680== by 0x6EFBF3D: dissect_acse_EXTERNALt (acse.cnf:157) ==6680== by 0x67BFE76: dissect_ber_sq_of (packet-ber.c:3524) ==6680== by 0x67C062D: dissect_ber_sequence_of (packet-ber.c:3555) ==6680== by 0x6EFD0DF: dissect_acse_Association_data (acse.cnf:287) ==6680== Address 0x13e13971 is 1 bytes inside a block of size 35 free'd ==6680== at 0x4C2BDEC: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6680== by 0x66B4B64: emem_free_all (emem.c:1187) ==6680== by 0x66B5CD0: epan_dissect_run_with_taps (epan.c:350) ==6680== by 0x413713: process_packet (tshark.c:3531) ==6680== by 0x40C871: main (tshark.c:3317) ==6680== ==6680== Invalid read of size 1 ==6680== at 0x9B1CFE0: g_str_hash (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==6680== by 0x9B1C568: g_hash_table_lookup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==6680== by 0x66C11EF: dissector_try_string (packet.c:1392) ==6680== by 0x67BD508: call_ber_oid_callback (packet-ber.c:1120) ==6680== by 0x67BC4D6: dissect_ber_choice (packet-ber.c:2925) ==6680== by 0x6EFC42F: dissect_acse_T_encoding (acse.cnf:129) ==6680== by 0x67BE0EC: dissect_ber_sequence (packet-ber.c:2425) ==6680== by 0x6EFC06F: dissect_acse_EXTERNALt_U (acse.cnf:147) ==6680== by 0x67BB60A: dissect_ber_tagged_type (packet-ber.c:717) ==6680== by 0x6EFBF3D: dissect_acse_EXTERNALt (acse.cnf:157) ==6680== by 0x67BFE76: dissect_ber_sq_of (packet-ber.c:3524) ==6680== by 0x67C062D: dissect_ber_sequence_of (packet-ber.c:3555) ==6680== Address 0x13e13970 is 0 bytes inside a block of size 35 free'd ==6680== at 0x4C2BDEC: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6680== by 0x66B4B64: emem_free_all (emem.c:1187) ==6680== by 0x66B5CD0: epan_dissect_run_with_taps (epan.c:350) ==6680== by 0x413713: process_packet (tshark.c:3531) ==6680== by 0x40C871: main (tshark.c:3317) ==6680== ==6680== Invalid read of size 1 ==6680== at 0x9B1CFFD: g_str_hash (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==6680== by 0x9B1C568: g_hash_table_lookup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==6680== by 0x66C11EF: dissector_try_string (packet.c:1392) ==6680== by 0x67BD508: call_ber_oid_callback (packet-ber.c:1120) ==6680== by 0x67BC4D6: dissect_ber_choice (packet-ber.c:2925) ==6680== by 0x6EFC42F: dissect_acse_T_encoding (acse.cnf:129) ==6680== by 0x67BE0EC: dissect_ber_sequence (packet-ber.c:2425) ==6680== by 0x6EFC06F: dissect_acse_EXTERNALt_U (acse.cnf:147) ==6680== by 0x67BB60A: dissect_ber_tagged_type (packet-ber.c:717) ==6680== by 0x6EFBF3D: dissect_acse_EXTERNALt (acse.cnf:157) ==6680== by 0x67BFE76: dissect_ber_sq_of (packet-ber.c:3524) ==6680== by 0x67C062D: dissect_ber_sequence_of (packet-ber.c:3555) ==6680== Address 0x13e13971 is 1 bytes inside a block of size 35 free'd ==6680== at 0x4C2BDEC: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6680== by 0x66B4B64: emem_free_all (emem.c:1187) ==6680== by 0x66B5CD0: epan_dissect_run_with_taps (epan.c:350) ==6680== by 0x413713: process_packet (tshark.c:3531) ==6680== by 0x40C871: main (tshark.c:3317) ==6680== ==6680== ==6680== HEAP SUMMARY: ==6680== in use at exit: 1,227,540 bytes in 30,741 blocks ==6680== total heap usage: 989,848 allocs, 959,107 frees, 63,997,313 bytes allocated ==6680== ==6680== LEAK SUMMARY: ==6680== definitely lost: 13,368 bytes in 1,255 blocks ==6680== indirectly lost: 36,744 bytes in 51 blocks ==6680== possibly lost: 0 bytes in 0 blocks ==6680== still reachable: 1,177,428 bytes in 29,435 blocks ==6680== suppressed: 0 bytes in 0 blocks ==6680== Rerun with --leak-check=full to see details of leaked memory ==6680== ==6680== For counts of detected and suppressed errors, rerun with: -v ==6680== ERROR SUMMARY: 144 errors from 4 contexts (suppressed: 0 from 0) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 10776] Buildbot crash output: fuzz-2014-12-13-7456.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 10776] Buildbot crash output: fuzz-2014-12-13-7456.pcap
- Prev by Date: [Wireshark-bugs] [Bug 10774] After changed with the prompt box, filter is only applied when user hits ENTER on it
- Next by Date: [Wireshark-bugs] [Bug 9332] WebSocket dissector: empty payload causes DISSECTOR_ASSERT_NOT_REACHED
- Previous by thread: [Wireshark-bugs] [Bug 10539] ad-data and pa-data structures other than IF-RELEVANT are no longer decoded in kerberos ASN1 dissector
- Next by thread: [Wireshark-bugs] [Bug 10776] Buildbot crash output: fuzz-2014-12-13-7456.pcap
- Index(es):