Wireshark-bugs: [Wireshark-bugs] [Bug 11554] New: Buildbot crash output: fuzz-2015-09-28-24093.p
Date: Mon, 28 Sep 2015 11:40:02 +0000
Bug ID 11554
Summary Buildbot crash output: fuzz-2015-09-28-24093.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2015-09-28-24093.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee bugzilla-admin@wireshark.org
Reporter buildbot-do-not-reply@wireshark.org

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2015-09-28-24093.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/11262-challenge101-1.pcapng

Build host information:
Linux wsbb04 3.13.0-61-generic #100-Ubuntu SMP Wed Jul 29 11:21:34 UTC 2015
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 14.04.3 LTS
Release:    14.04
Codename:    trusty

Buildbot information:
BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark
BUILDBOT_BUILDNUMBER=3321
BUILDBOT_URL=http://buildbot.wireshark.org/trunk/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=13d28691d6f1deae263a976d9defedd6f1ebb0d2

Return value:  0

Dissector bug:  0

Valgrind error count:  2



Git commit
commit 13d28691d6f1deae263a976d9defedd6f1ebb0d2
Author: Stig Bjørlykke <stig@bjorlykke.org>
Date:   Tue Sep 15 08:46:43 2015 +0200

    Qt: Use "" for empty QString const reference.

    Change-Id: I686eadc865ae38433c3795450aeca8582a74d2c8
    Reviewed-on: https://code.wireshark.org/review/10535
    Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org>
    Petri-Dish: Michael Mann <mmann78@netscape.net>
    Reviewed-by: Michael Mann <mmann78@netscape.net>


Command and args: ./tools/valgrind-wireshark.sh 

==10889== Memcheck, a memory error detector
==10889== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==10889== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright
info
==10889== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2015-09-28-24093.pcap
==10889== 
==10889== Invalid read of size 1
==10889==    at 0xB93CC6A: inflate (in /lib/x86_64-linux-gnu/libz.so.1.2.8)
==10889==    by 0x682EE61: tvb_uncompress (tvbuff_zlib.c:111)
==10889==    by 0x682F282: tvb_child_uncompress (tvbuff_zlib.c:335)
==10889==    by 0x6B9C213: dissect_http_message (packet-http.c:1375)
==10889==    by 0x6B9956B: dissect_http (packet-http.c:2950)
==10889==    by 0x67FBB9F: call_dissector_work (packet.c:618)
==10889==    by 0x67EBC2E: try_conversation_dissector (conversation.c:1312)
==10889==    by 0x6F68656: decode_tcp_ports (packet-tcp.c:4103)
==10889==    by 0x6F69789: process_tcp_payload (packet-tcp.c:4207)
==10889==    by 0x6F68B75: dissect_tcp_payload (packet-tcp.c:2075)
==10889==    by 0x6F6C979: dissect_tcp (packet-tcp.c:5115)
==10889==    by 0x67FBBBD: call_dissector_work (packet.c:620)
==10889==  Address 0x152fd7ca is 0 bytes after a block of size 10 alloc'd
==10889==    at 0x4C2AB80: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10889==    by 0xA393610: g_malloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==10889==    by 0x68301EE: tvb_memdup (tvbuff.c:829)
==10889==    by 0x682ECD3: tvb_uncompress (tvbuff_zlib.c:70)
==10889==    by 0x682F282: tvb_child_uncompress (tvbuff_zlib.c:335)
==10889==    by 0x6B9C213: dissect_http_message (packet-http.c:1375)
==10889==    by 0x6B9956B: dissect_http (packet-http.c:2950)
==10889==    by 0x67FBB9F: call_dissector_work (packet.c:618)
==10889==    by 0x67EBC2E: try_conversation_dissector (conversation.c:1312)
==10889==    by 0x6F68656: decode_tcp_ports (packet-tcp.c:4103)
==10889==    by 0x6F69789: process_tcp_payload (packet-tcp.c:4207)
==10889==    by 0x6F68B75: dissect_tcp_payload (packet-tcp.c:2075)
==10889== 
==10889== Invalid read of size 1
==10889==    at 0xB93CC94: inflate (in /lib/x86_64-linux-gnu/libz.so.1.2.8)
==10889==    by 0x682EE61: tvb_uncompress (tvbuff_zlib.c:111)
==10889==    by 0x682F282: tvb_child_uncompress (tvbuff_zlib.c:335)
==10889==    by 0x6B9C213: dissect_http_message (packet-http.c:1375)
==10889==    by 0x6B9956B: dissect_http (packet-http.c:2950)
==10889==    by 0x67FBB9F: call_dissector_work (packet.c:618)
==10889==    by 0x67EBC2E: try_conversation_dissector (conversation.c:1312)
==10889==    by 0x6F68656: decode_tcp_ports (packet-tcp.c:4103)
==10889==    by 0x6F69789: process_tcp_payload (packet-tcp.c:4207)
==10889==    by 0x6F68B75: dissect_tcp_payload (packet-tcp.c:2075)
==10889==    by 0x6F6C979: dissect_tcp (packet-tcp.c:5115)
==10889==    by 0x67FBBBD: call_dissector_work (packet.c:620)
==10889==  Address 0x152fd7cb is 1 bytes after a block of size 10 alloc'd
==10889==    at 0x4C2AB80: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10889==    by 0xA393610: g_malloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==10889==    by 0x68301EE: tvb_memdup (tvbuff.c:829)
==10889==    by 0x682ECD3: tvb_uncompress (tvbuff_zlib.c:70)
==10889==    by 0x682F282: tvb_child_uncompress (tvbuff_zlib.c:335)
==10889==    by 0x6B9C213: dissect_http_message (packet-http.c:1375)
==10889==    by 0x6B9956B: dissect_http (packet-http.c:2950)
==10889==    by 0x67FBB9F: call_dissector_work (packet.c:618)
==10889==    by 0x67EBC2E: try_conversation_dissector (conversation.c:1312)
==10889==    by 0x6F68656: decode_tcp_ports (packet-tcp.c:4103)
==10889==    by 0x6F69789: process_tcp_payload (packet-tcp.c:4207)
==10889==    by 0x6F68B75: dissect_tcp_payload (packet-tcp.c:2075)
==10889== 
==10889== 
==10889== HEAP SUMMARY:
==10889==     in use at exit: 1,037,102 bytes in 28,198 blocks
==10889==   total heap usage: 624,853 allocs, 596,655 frees, 45,026,280 bytes
allocated
==10889== 
==10889== LEAK SUMMARY:
==10889==    definitely lost: 2,964 bytes in 128 blocks
==10889==    indirectly lost: 36,488 bytes in 51 blocks
==10889==      possibly lost: 0 bytes in 0 blocks
==10889==    still reachable: 997,650 bytes in 28,019 blocks
==10889==         suppressed: 0 bytes in 0 blocks
==10889== Rerun with --leak-check=full to see details of leaked memory
==10889== 
==10889== For counts of detected and suppressed errors, rerun with: -v
==10889== ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.